IBM Security SiteProtector System User Guide for Security Analysts

Size: px
Start display at page:

Download "IBM Security SiteProtector System User Guide for Security Analysts"

Transcription

1 IBM Security IBM Security SiteProtector System User Guide for Security Analysts Version 2.9

2 Note Before using this information and the product it supports, read the information in Notices on page 83. This edition applies to version 2.9 of the IBM Security SiteProtector System and to all subsequent releases and modifications until otherwise indicated in new editions. Copyright IBM Corporation 1994, US Government Users Restricted Rights Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp.

3 About this publication This guide provides background information, procedures, and recommendations for using the IBM Security SiteProtector System to assess vulnerabilities and monitor and analyze suspicious activity on your network. This guide provides guidelines for analyzing event data from a variety of IBM Security agents, including Network Intrusion Prevention System (IPS) appliances, Network Multi- Function Security appliances, IBM Security Server Protection, and IBM Internet Scanner. This guide does not provide guidelines for analyzing data from Proventia Network Enterprise Scanner or from third-party products. Intended audience The intended audience for the IBM Security SiteProtector System User Guide for Security Analysts is security analysts, network administrators, and risk assessment analysts who are responsible for monitoring and assessing threats and vulnerabilities in enterprise environments. This guide assumes you have intermediate knowledge of network security and networking technologies, and basic knowledge of SiteProtector system operations. Information covered in this guide v SecurityFusion Module This guide provides procedures and guidelines for analyzing SecurityFusion Module events. Where appropriate, this guide provides guidelines for using the SecurityFusion Module to identify suspicious activity. v Incidents, exceptions and tickets The guide provides procedures and guidelines for creating incidents, exceptions, and tickets. Incidents and exceptions let you track and prioritize important events. Ticketing is a more powerful tracking system that lets you track and prioritize events and assign responsibility to the appropriate parties. v Reporting module This guide assumes that you have configured the SiteProtector system Reporting module. The Reporting module provides reports that are designed for a wide range of activities, including management, analyst, and audit activities. v Agent policy settings This guide assumes that you have effectively tuned agents to monitor or assess your network and to respond threats. Related documentation Use the following SiteProtector documents to install, configure, and start using SiteProtector. Document IBM Security SiteProtector System Installation Guide IBM Security SiteProtector System Configuration Guide IBM Security SiteProtector System Policies and Responses Configuration Guide Contents Contains information that you need to install the SiteProtector system, including procedures for securing communication between components. Contains information that you need to configure, update, and maintain the SiteProtector system. Contains information for a Security Manager to configure, update, and maintain policies and responses for a SiteProtector System Copyright IBM Corp. 1994, 2011 iii

4 Document IBM Security SiteProtector System Configuring Firewalls for SiteProtector Traffic IBM Security SiteProtector Information Center (Help) Contents Contains information for a Security Manager to configure firewalls so that network devices and SiteProtector System components can communicate with each other. Contains many of the procedures that you need to use the SiteProtector system. The SiteProtector system guides are available as portable document format (PDF) files in one or more of the following places: v The IBM Security product Information Center v The Deployment Manager Note: Documents must be manually downloaded to the Deployment Manager. The installation and user guides for related products are available in one or more of the following places: v the SiteProtector system box v the IBM Security product DVD v The IBM Security product Information Center iv SiteProtector System: Security Analysts' User Guide

5 Contents About this publication iii Chapter 1. Introduction to the SiteProtector system What is the SiteProtector system? SiteProtector system architecture SiteProtector system components and features... 3 SiteProtector system Web Console Logging on to the Web Console Troubleshooting Filters Applied Add-on components Chapter 2. Monitoring Your Network.. 7 Section A: SiteProtector System Analysis Components 7 Section B: Analyzing Events Selecting an Analysis view Selecting an Analysis perspective Configuring columns Filtering events Using event detail filters Sorting events Grouping events Clearing events Restoring cleared events Viewing security information Creating a custom Analysis view Selecting guided questions Managing views Exporting a view Working with event details Navigating analysis history Managing view permissions Section C: Monitoring system health Health Summary Health summary icons Notifications Section D: Viewing Anomaly Detection Content.. 16 Accessing ADS content Viewing ADS entity information Section E: SecurityFusion Module Impact Analysis 18 Section F: Locating Assets and Agents Finding groups for an agent or asset Finding assets in a group Chapter 3. Reporting Creating reports Selecting a template Creating a new report Scheduling a report Creating templates Exporting a template Importing a template Deleting reports, templates, and schedules Deleting a report Deleting a schedule Deleting a template Finding reports Sending reports in Setting a report sample image Managing template permissions Communicating data from the Analysis view Exporting data Scheduling exports of data Creating reports in the Analysis view Scheduling reports in the Analysis view Chapter 4. Identifying and resolving network vulnerabilities Developing vulnerability assessment plans Vulnerability data generated by the SiteProtector system Gathering information about vulnerability events.. 32 Deciding whether to resolve vulnerabilities Repairing and mitigating vulnerabilities Creating a plan of action Implementing upgrades and patches Chapter 5. Managing Scans Identifying hosts on your network Ensuring that vulnerability data is complete and accurate Scheduling vulnerability scans Running background scans Reducing the time required to run scans Chapter 6. Detecting Suspicious Activity Section A: Suspicious Activity Section B: Monitoring Event Analysis Views Choosing the traffic to monitor and correlate.. 42 Summary view Event Name view Target view Attacker view Scenarios for using guided questions and Event Analysis views Section C: Filtering Activity from Analysis Views.. 49 Creating baselines Creating incidents and exceptions Chapter 7. Is Suspicious Activity Significant? Identifying the location of an attack Analyzing the Event Analysis - Agent view Identifying activity caused by vulnerability scans.. 56 Filtering authorized scans using attack patterns.. 57 Creating exceptions to filter scan activity Creating exceptions for filtering scans from the Console Copyright IBM Corp. 1994, 2011 v

6 Identifying activity caused by misconfigured systems Identifying normal activity commonly identified as suspicious Chapter 8. Is an Attack a Threat? Section A: Using the SecurityFusion Module to Assess an Attack Viewing attack statuses Section B: Assessing an Attack Manually Determining the X-Force risk level of an attack 66 Was the attack target vulnerable? Was the target service or operating system susceptible? Chapter 9. Tracking and Prioritizing Confirmed Attacks Guidelines for establishing ticket priority Creating tickets Creating tickets Viewing tickets Viewing and editing tickets Chapter 10. Determining the Scope of Attack Attack scope Goals of typical attackers Viewing the number of assets targeted by an attacker Viewing the number of platforms targeted by an attacker Notices Trademarks Index vi SiteProtector System: Security Analysts' User Guide

7 Chapter 1. Introduction to the SiteProtector system This chapter introduces SiteProtector system components and the agents that work with the SiteProtector system. Terms to know The following table describes the terms used for security products in this document: Term agent appliance scanner sensor Description The generic term for all sensors, scanners, and Desktop Endpoint Security agents. An inline security device on a network or gateway. Depending on the type of appliance, it can provide any combination of intrusion detection and prevention, antivirus, antispam, virtual private networking (VPN), Web filtering, and firewall functions. An agent that scans assets for vulnerabilities and other security risks. An agent that monitors network traffic on the network and on servers to identify and, in some cases, stop attacks. What is the SiteProtector system? A SiteProtector system is a centralized management system that unifies management and analysis for network, server, and Desktop Endpoint Security agents and appliances. You can easily scale the SiteProtector system to provide security for large, enterprise-wide deployments. Reference: Refer to the "Supported agents and appliances" appendix in the IBM Security SiteProtector System Installation Guide for information about the agents and appliances that can be configured to communicate with and be managed by the SiteProtector system. Components and agents The components and agents in a SiteProtector system fall into these categories: v The SiteProtector system consists of required and optional components that provide the base functionality necessary to accept, monitor, and analyze network events. Depending on your Site requirements, you may need to install more than one of some components. v You can purchase add-on components for the SiteProtector system that provide additional functions. v You can purchase agents that complete your security system, including vulnerability scanners, intrusion detection and prevention appliances and sensors, and integrated security appliances. SiteProtector system components by type The following table provides lists of the required and optional SiteProtector system components, add-on components, and the agents that the SiteProtector system manages: Copyright IBM Corp. 1994,

8 SiteProtector System Components Agent Manager Console Site Database Deployment Manager Event Archiver Event Collector Event Viewer SP Core (includes the application server and sensor controller) SiteProtector Reporting SiteProtector system SecurityFusion Module X-Press Update Server Web Console Add-on Components SiteProtector system SecureSync Integrated Failover System Agents That The SiteProtector System Manages sensors scanners appliances Desktop Endpoint Security agents SiteProtector system architecture The SiteProtector system has established communication channels that are set up when you install the product. Depending on your Site requirements, you may need to install more than one of some components. The most typical SiteProtector system installations use one, two, or three computers. When you use more than one computer, the Recommended option (from the Deployment Manager) installs the components on the correct computers automatically. Illustration of components The following figure illustrates the components in a standard instance of the SiteProtector system that uses three computers: 2 SiteProtector System: Security Analysts' User Guide

9 SiteProtector system components and features The IBM Security SiteProtector System consists of required and optional components that provide the base functionality necessary to accept, monitor, and analyze network events. Component descriptions The following table describes the purpose of the SiteProtector System core components: SiteProtector System Component Agent Manager Console Deployment Manager Event Archiver Description The Agent Manager manages the command and control activities of the Desktop Protection agents, IBM Security Server Protection, and Proventia Network MFS, X-Press Update Server, and Event Archiver; and it also facilitates data transfer from agents to the Event Collector. The SiteProtector Console is the main interface to SiteProtector where you can perform most SiteProtector functions, such as monitoring events, scheduling scans, generating reports, and configuring agents. The Deployment Manager is a Web server that lets you install any of the SiteProtector components and agents on computers on your network. The Event Archiver provides the capability to archive security events to a remote location, thereby reducing the number of events that the database must store. Chapter 1. Introduction to the SiteProtector system 3

10 SiteProtector System Component Event Collector Event Viewer Reporting module SecurityFusion module Description The Event Collector manages real-time events from sensors and agents as well as vulnerability data from scanners. The SiteProtector Event Viewer receives unprocessed events from the Event Collector to provide near real-time access to security data for troubleshooting. The Reporting module generates graphical summary and compliance reports that provides the information that you need to assess the state of your security. Reports cover vulnerability assessment, attack activities, auditing, content filtering, Desktop Protection security, SecurityFusion and virus activity. The SiteProtector SecurityFusion module greatly increases your ability to quickly identify and respond to critical threats at your Site. Using advanced correlation and analysis techniques, the module identifies both high impact events and patterns of events that may indicate attacks. Impact analysis The module correlates intrusion detection events with vulnerability assessment and operating system data and immediately estimates the impact of events. Site database SP Core X-Press Update Server Web Console The SiteProtector database stores raw agent data, occurrence metrics (statistics for security events triggered by agents), group information, command and control data, and the status of X-Press Updates (XPUs). The SP core includes the following components: v The application server enables communication between the SiteProtector System Console and the SiteProtector database. v The Sensor Controller manages the command and control activities of agents, such as the command to start or stop collecting events. A Web server that downloads requested X-Press Updates (XPUs) from the IBM Security Download center and makes them available to the agents and components on the network. The Update Server eliminates the need to download updates for similar products more than once and allows users to manage the update process more efficiently. The SiteProtector System Web Console is an interface that provides easy access to some of the features in the SiteProtector System for monitoring SiteProtector System assets and security events. SiteProtector system Web Console The SiteProtector system Web Console is a Web-based version of the Console. You can perform the following tasks through the Web Console: v analyze event data v apply filters to event data 4 SiteProtector System: Security Analysts' User Guide

11 v copy data to another application, such as a spreadsheet You log on to the SiteProtector system Web Console using the same account information as you would using the Console. When you log on, the Site appears in the left pane in your browser, and the Site's Summary page appears in the right pane. Web Console requirements You must open the Web Console on a computer that has the Sun Java Runtime Environment (JRE). If you open the Web Console on a computer that does not have the JRE installed, it directs the browser to install the JRE. You do not have to close the Web Console for the installation to complete successfully. Reference: Refer to the "Hardware and software requirements" chapter in the IBM Security SiteProtector System Installation Guide for specific information about Web Console requirements. Logging on to the Web Console Log on to the SiteProtector Web Console for a high-level overview of your Site and the event activity on your Site. Before you begin v Obtain access rights to all groups you plan to monitor. v Obtain the IP address or DNS name and port number for the application server. Note: The default port number for the Deployment Manager and Application server is If the port number has been changed, contact your Site administrator to get the correct port number. v In the SiteProtector System Console, move assets out of the Ungrouped Assets folder. Ungrouped assets are not displayed in the Web Console. v Install Sun Java plugin version or higher if any of the following conditions are true: you use a computer that does not have access to the Internet you use a computer behind a network proxy server Note: The IBM Security SiteProtector System Web Console is designed to support Internet Explorer 8.0 and later. 1. Type the address of the SiteProtector Deployment Manager or Application Server in the Address box of your Web browser using one of the following formats: v name:3994/siteprotector/ v address:3994/siteprotector/ v name: port number/siteprotector v address: port number/siteprotector 2. Type your Username and Password, and then click Submit. Tip: You can bookmark the URL of the Web Console and use it the next time you want to log on. Troubleshooting Filters Applied When you click Filters Applied, if the Advanced Filters window does not load, you may need to manually install the Sun Microsystems Java SE Runtime Environment (JRE). You must manually install the Java plugin when your operating system is Microsoft Windows 2003 and your computer is behind a proxy server. Chapter 1. Introduction to the SiteProtector system 5

12 About this task When you do not have the Java plug-in installed, the Web Console attempts to install the plug-in automatically. If your computer is behind a proxy server and running Microsoft Windows 2003, automatic installation of the plugin fails. When automatic installation fails, you must either install the plug-as an off-line package or download the plug-in to another computer, copy it to the computer running the Web Console, and then install it. 1. Go to 2. Download and install JRE 6 or higher. Important: During installation, select Windows Offline Installation. Windows Online Installation fails on computers that are running Microsoft Windows 2003 behind a proxy server. Add-on components The add-on components for the SiteProtector system provide additional protection and functionality that go beyond the base protection of the SiteProtector system. SecureSync Module The Secure Sync Module provides a failover system that lets you transfer Site data between primary and back-up Sites and transfer agent management from one Site to another. 6 SiteProtector System: Security Analysts' User Guide

13 Chapter 2. Monitoring Your Network The SiteProtector system provides several monitoring, correlation, and search tools that can assist you with event detection and threat investigation. Use the information in this chapter to become familiar with these tools as they are referenced frequently in this guide. Section A: SiteProtector System Analysis Components The SiteProtector system provides several components for monitoring events. These components let you filter and sort data at all stages of event detection and investigation. SiteProtector system analysis components The following table describes the SiteProtector system event analysis components. Some of these components are discussed in more detail later in this chapter: Component Summary View Analysis Perspectives Analysis views Guided questions SiteProtector system toolbar Analysis filter panel Filters window Description Provides several predefined panes that display different types of summary information in a portal-like user interface. Each type of information appears as a nested pane of the summary tab, and users can choose which types of information to display. The information displayed on the summary tab is dependent upon the currently selected group in the group tree. Provide a different focus of the events that appear in the Analysis views, such as changing whether a selected asset is the target or the source of activity. Provide event information that is organized in a tabular format. Provide predetermined filters that correspond to guided questions. Provide a series of questions on the pop-up menu for one or more events that you select from the Analysis view. The questions focus on information you typically need when you investigate an event. By clicking on a question, you automatically change the filters and the analysis view that is displayed. Provides options that enable you to perform common tasks with the analysis tool, such as refreshing the event data, moving backward or forward through the history, or opening the Filters window. Displays filters above the analysis view so they are easily accessible. The same filters are available in the Filters editor. Provides a list of filters available on the Site Protector Console. By selecting a filter, you can see the set of attributes with values that you can customize and a description of the filter. Section B: Analyzing Events This section provides procedures and background information about using analysis views, analysis modes, and guided questions and customizing these tools for specific tasks. Selecting an Analysis view Use analysis views as a starting point for event detection and for creating customized reports. Analysis views have predefined settings for filters and columns. Copyright IBM Corp. 1994,

14 About this task Application Monitoring, Appscan, Event Analysis, File Integrity, Virtual Infrastructure, and Vuln Analysis. Analysis views are divided into the following categories: v Application monitoring (only enabled with Proventia Desktop Endpoint Security) v Appscan v Event Analysis v File Integrity (for Security Server Protection for Windows only) v Virtual Infrastructure v Vuln Analysis Note: The name of the Analysis view appears above the event data. The name is followed by the Analysis Perspective surrounded by parentheses. The Analysis Perspective might vary because the SiteProtector system chooses the Analysis Perspective based on the Analysis view. 1. In the Analysis view, click View > Load. 2. In the Load View window, select a view. Selecting an Analysis perspective Use Analysis perspectives to change the focus of data that is associated with a selected asset. An Analysis perspective can match the source, target, or agent IP address, or any combination of the three. 1. In the Analysis view, select an asset or group of assets from the My Sites pane. 2. Click Action > Analysis Perspective, and then select one of the following perspectives: Select this Analysis Perspective... Target Agent Source Source and Agent Target and Agent Target and Source Target, Agent, and Source To view every instance of an event when the selected asset... was a target of events. has an agent installed that detected events. was a source of events. was both the source of the events and has an agent installed that detected the events. was both the target of the events and has an agent installed that detected the events. was both a target and a source of the events. was a target or source of events, an agent that detected the displayed events, or all three. Example You want to see if any agent in a group is the target of an attack. You select the group, and then choose Target as the Analysis Perspective. Each event with a target IP address that matches the IP address of the agent is displayed. Configuring columns Configure columns to specify the type of events you see in the Analysis view. 8 SiteProtector System: Security Analysts' User Guide

15 1. In the Analysis view, click View > Add or Remove Columns. 2. In the Add or Remove Columns window, select or clear the check boxes for the columns you want to add or remove. 3. Select a column or columns and click Move Up or Move Down to change the order of the columns. Tip: You can also click and drag columns in the Analysis view to a new position. 4. Click OK. Filtering events Apply filters to events in the Analysis view to view only the events you are interested in. Filtering events helps you to manage vulnerabilities, to investigate attacks, and to monitor applications. 1. Select the group you want to examine in the My Sites pane. 2. Configure the Time Filter to specify the time period for which you want to view events. 3. Configure the most common filter types, Tag Name, Source IP, and Target IP, by typing a valid string or IP address. You can use IPv4 or IPv6 addresses. v Use a hyphen (-) or CIDR notation to specify an IP range. v Use the operator Not to exclude events with a specified value. v Use wildcard characters to find events with the value inside the tag name. Note: Wildcard characters are * and %. v For multiple entries insert a space between each entry. v For multiple-word tag name entries use quotation marks. Note: IPv6 address ranges must be specified by CIDR notation. 4. Click Apply. Note: To configure the Console to refresh data automatically, click Tools > Options and then select Auto Refresh in the Options window. Example Use the following examples as guides for configuring the most common filter types: Tag Name, Source IP, or Target IP. v *IRC* v NOT v * v v /8 v 2001:DB8:0:0:0:0:0:0 v 2001:DB8:0:0:0:0:0:0/32 v 2001:DB8::/32 What to do next Click Filters to configure additional filter types in the Edit Filters window. Chapter 2. Monitoring Your Network 9

16 Using event detail filters Use event detail filters to filter on event detail columns that are generated for the Analysis view. The event detail columns are based on the contents of events that are logged in the Site database. Before you begin Before you can filter events according to event details, you must add the event details to your analysis view. Event details are always shown on the Event Analysis - Details and the Virtual Infrastructure - Details views, but you can add event details to any view by selecting Show Event Details in the Event Category Filter. About this task Important: Using event detail filters on a large set of data could result in a long query. For best results, filter the data as much as possible before you apply event detail filters. Tip: You can right-click an event detail column to filter by a value in that column. 1. In the Analysis view, click Filters. 2. In the Edit Filters window, click Add to add a detail filter. 3. In the Add an Event Detail Filter window, type the name of the event detail column that you would like to filter on, and then click OK. The Edit Filter window reappears, with the new event detail filter you added to the Column Filters pane. 4. In the new event detail filter pane, type the value you want to use, and then click OK. v Use the wildcard characters * to find events with the value inside the tag name. v Insert a space between multiple entries. v Do not use the operator Not to exclude events. Example Use the following examples as guides for filter event details: v v 8* 6* Sorting events Sort events in the Analysis view in ascending or descending order. About this task Arrows indicate that a column has been sorted. If the arrow is pointed up, the column is sorted in ascending order. If the arrow is pointed down, the column is sorted in descending order. Perform one of the following actions to sort a column: v Click a column header to sort. v Right-click a column header and select either Sort Ascending or Sort Descending. v In the Analysis view, click View > Sort, and then in the Sort window, configure sorting for up to four columns. 10 SiteProtector System: Security Analysts' User Guide

17 Grouping events Group events in the Analysis view by column. About this task You can group events by multiple columns. Plus signs, followed by the column name, indicate that data has been grouped by that column. Perform one of the following tasks to sort a column: v Click View > Group By, and then select the columns to group by in the Group By Columns window. v Right-click a column header and select Group By to group by that column. Tip: To remove groupings click View > Clear Groupings or right-click a column header and select Clear Groupings. Clearing events Use the Clear option to clear unimportant events from an Analysis tab. About this task If you clear unimportant events, it is easier to identify events that are potential threats. Important: If you clear all events in the view such that the view is empty, you cannot restore the cleared events. 1. In an Analysis tab, select the events you want to clear. 2. Click Action > Clear Events. Restoring cleared events Use the Restore Events option to restore previously cleared events. 1. On an Analysis tab, select the view for which you want to restore events. 2. Click View > Add or Remove Columns. 3. In the Add or Remove Columns window, select Cleared Count and then click OK. 4. Sort the Cleared Count column by descending order to see cleared events first. 5. Select the events you want to restore, and then click Action > Restore Events. 6. In the Restore Event(s) window, click Yes. Viewing security information If you are not interested in the details of an event, use the View Security Information option to view only the description of the event from the X-Force. 1. Select an event on an Analysis tab. 2. Click Action > View Security Information. The security information appears in the Vulnerability Info window. Chapter 2. Monitoring Your Network 11

18 Creating a custom Analysis view Create a custom Analysis View if none of the predefined views contain the information you want to see. 1. On an Analysis tab, create the view you want by changing the sort criteria, the grouping, the filter options, and the columns to be displayed. 2. Click View > Save. 3. Type a name for the new view in the View Name field. Note: You cannot use the Description or File name of a predefined view. 4. Click Save. The view you created appears at the end of the Analysis View list by the name you gave it in the View Name field. Selecting guided questions Guided questions provide a quick way for you to gather information about an event or group of events. Use guided questions to gather event information for monitoring and detecting events or for performing more focused inquiries. What are guided questions? Guided questions are a series of questions that appear on the pop-up menu for one or more selected events. These questions are based on the analysis views, and they try to anticipate information you may need. By clicking on a question, you automatically change the filters and the analysis view that is displayed. Using guided questions Use guided questions to select an Analysis View based on questions you have about an event. About this task When you choose a guided a question, the SiteProtector System automatically selects the Analysis View that corresponds to the question. 1. In the left pane, select the group or asset whose information you want to view. 2. Select Analysis from the Go to list. 3. Right-click an event, and then select a question from the guided questions. The Analysis View list changes to the view the guided question selected. Managing views Use the Manage views window to rename, copy, delete, and import views. You can also manage permissions for Analysis views in the Manage Views window. 1. In the Analysis view, click View > Manage. 2. Select one of the following options: Option Rename Copy Delete Description Rename a view. Copy a view to create a new view with the same settings. Permanently delete a view from your Console. 12 SiteProtector System: Security Analysts' User Guide

19 Option Permissions Import Description Manage permissions for the selected view. Import a new view. Note: You must have control permission to rename or delete a view created by a user ( ). The default views ( ) that come with SiteProtector cannot be renamed or deleted. Exporting a view Export a view to work with large amounts of data, to work with data outside of SiteProtector, and to work with data that is not formatted. Before you begin You must select at least one event to use Export View. About this task Exporting a view is the same as exporting data. 1. Click View > Export View. 2. In the Export window, type a File path, select a File Type, and specify what data to export in the Exported Content section. Note: You can only exclude columns that are already in the Analysis view. To include a column in the exported data, go back to the Analysis view and add the column before you export the data. 3. Optional: Select Include Security Information to include remediation information for each event. Working with event details Use the Event Details window to view, copy, and export the details of specific events. The Event Details window displays basic event details, attribute value pair information, security information, and, if available, raw packet data. About this task v By default, multiple occurrences of the same type of event are combined in one row, and the Event Count column indicates the number of occurrences. v The title bar of the Event Details window shows the number of events associated with the selected event and the sequence of the event you are viewing; for example, the first of five events is displayed as 1/5. 1. On an Analysis tab, select the row with the event you want to investigate, and then click Object > Open. 2. If the row you selected contains multiple events, you can locate a specific event as follows: If you want to view... Then... events in order click >> to view the details of the next event in the sequence, or click << to view the details of the previous event in the sequence. a specific event type the event number in the Event Number field, and then click Go. Chapter 2. Monitoring Your Network 13

20 3. Optional: Click Copy to copy the event details to the clipboard. 4. Optional: Click Export, type or browse to the file you want to save the details, and then click Save. Note: The.txt and.xls file extensions are supported. 5. Click OK to close the window. Navigating analysis history In the Analysis tab, use the Back and Forward icons to retrace your actions, such as, applying a different Analysis View or Analysis Perspective, or changing filter settings. About this task Data is cached when you navigate through the Analysis view. In an Analysis tab, do the following: v Click the Back icon to trace your actions prior to the current view. v Click the Forward icon to trace your actions applied after the current view. Managing view permissions Use permissions for an Analysis view to define which users or groups can view or control the Analysis view. 1. In the Analysis view, click View > Manage. 2. In the Manage Views window, select a view, and then click Permissions 3. In the Manage Permissions window, select a user or group, and then select permissions for the user or group. Note: If a user or group is not displayed in the Users and/or Groups box, click Add to add the user or group. 4. Optional: Click Advanced to change the current owner of the template. Section C: Monitoring system health System health options vary for each agent. Some options might not be available for all agents managed by SiteProtector. Health Summary Use the Health Summary pane to view agent messages, metrics, and the result of health checks performed on agents managed by SiteProtector. Health checks are used to monitor the health of agents. Some checks are informational only and do not affect the agent's health status. Some health checks can be configured to enter a warning or failed state. For health checks configured to enter a warning or failed state, information appears in the following places: v a notification for that health check appears in the Notifications tab v the agent's health status appears as warning or unhealthy in the Notifications tab and in the Agent view 14 SiteProtector System: Security Analysts' User Guide

21 Notifications are not created in the Console for Informational health checks. Agent Messages include : v Info Events: Agent info events that appear as Info, Warning, or Error. Note: Previously, Info Events appeared in the Analysis view. Info Event do not affect agent health. v Application Artifacts: Application Artifacts affect agent health. The following options might be available for a health check: Option Configure Ignore Health Status Remedy Action Click Configure to set warning and fail notifications for a health check. Click Ignore Health Status to stop the Console from creating a notification in the Notifications tab. Information for the health check is still gathered by the Console and displayed in the Health Summary pane. Click the Remedy link for steps to correct a health check that is in a warning or failed state. Note: You can configure alerts and Console notifications in Console Options. Health summary icons Health summary icons appear next to the name of each health check and can appear in the health summary pane beside a group name. Icon Description Health check has failed. Icon also indicates that the agent has failed at least one health check in the group. Health check passed. Icon also indicates that the agent has passed all health checks in the group. Health check provides information, but does not produce a notification in the Console. Icon also indicates that health checks in the group do not produce notifications in the Console. Health check is in a warning state and about to fail. Health check is in an unknown state. Try updating SiteProtector agents before using the IBM Support Portal. Notifications Use the Notifications view to see notifications for health checks performed on agents managed by SiteProtector. The Notifications view contains notifications from all Sites connected to your Console. To view details about a notification, click Action > Open Notification. Notifications for a new or recurring event appears bold in the Notifications tab. Notifications are deleted from the Console after two weeks. Note: Only notifications with severities you have configured to appear in the Console will appear in the Notifications view. Click Tools > Options > Notifications to specify the severity of notifications to display in the Console. When you disconnect from a Site, notifications for that site are removed from your Console. Chapter 2. Monitoring Your Network 15

22 Current Agent Health refers to the following: v Healthy: Agent has passed all health checks. v Unhealthy: Agent has failed at least one health check. v Warning: Agent is about to fail at least one health check or the agent has important information that requires attention. Note: Severity is defined by each agent. See each agent's reference for severity levels and definitions. Note: You can configure alerts and Console notifications in Console Options. Viewing notifications Use the Notifications view to see notifications for health checks that have failed or are about to fail. 1. Click the Notifications icon to open the Notifications tab. Tip: The Notifications icon is animated when you have new notifications. 2. Optional: To view the agent's health summary, select a notification, and then click Action > Open Notification. Note: You can only open one health summary at a time. 3. Optional: To delete the notification, select a notification, and then click Action > Delete. Section D: Viewing Anomaly Detection Content Anomaly detection content is crucial to detecting patterns of suspicious activity on your network. The SiteProtector system lets you view anomaly detection content in the Traffic Analysis view. Important: To view ADS content, you must have an ADS appliance configured to communicate with the SiteProtector system. Multiple ADS analyzer appliances You can include multiple ADS analyzer appliances on your Site. If you have multiple ADS analyzers, you can set a preferred appliance to search for network behavior for host objects and view traffic analysis in the SiteProtector system. If you do not select one of the appliances as preferred, the first appliance registered will be chosen as the default. ADS viewing options You can set options for how to display ADS events in Tools > Options > Browser. Accessing ADS content You can navigate and access ADS content from the SiteProtector system in several different ways. This topic provides a procedure for accessing ADS content. Starting the ADS Web Console 1. In the left pane of the SiteProtector system Console, select a group that contains the ADS appliance, and then select the ADS appliance. 2. Do one of the following: v Right-click the agent, and then select Launch > Proventia Manager. 16 SiteProtector System: Security Analysts' User Guide

23 v Select Action, and then select Launch > Proventia Manager. A browser opens, displaying the ADS appliance Web Console. Accessing ADS content Use the options in the following table to access ADS content: Option Action Menu Description To navigate to the ADS event details, select one or more rows in the Agent, Analysis, or Asset view, and then select the Network Behavior option on the Action menu. You can also right-click on the agent(s) or asset(s) to view details. Agent > Launch > Proventia Manager Event Analysis - Details Event Analysis - Event Name Traffic Analysis tab From the Agent view, you can open a separate browser from the Launch option to view the ADS Web Console. From the Analysis view, select Event Analysis Details to display selected IP addresses for Analysis view, Agent view, and Asset view. Select Action > What are the ADS Event Details for information. From the Analysis view, select the event, right-click, and then select Open Event Details to display the ADS event details. You can also link to the ADS event details by clicking on the icon next to ADSEvent.url attribute in the Event Attribute Value Pairs table. Select the Traffic Analysis tab to view ADS content for the selected group. Viewing ADS entity information Use the Network Behavior command to view ADS entity information in the Console. 1. In the left pane of the Console, select a group or asset for which you want to view content. 2. Select the Agents, Event Analysis - Details, or Assets view. 3. Select the agents, assets, or event(s) you want to investigate. 4. Click Action > Network Behavior, and then select the ADS information you want to review. Tip: You must select a single row to view event information. You can select multiple rows to view entity information, but only the first 15 unique items are displayed in the menu. Using the What are the ADS event details? option Use the What are the ADS event details? link to view event details from selected IP addresses in the Analysis view. 1. Select Analysis from the Go to list, and then select a group or asset for which you want to view events. 2. Select Event Analysis-Details, and then select the event. 3. Click Action > What are the ADS event details?. Viewing traffic analysis Use the Traffic Analysis tab to view ADS content for a selected group. Chapter 2. Monitoring Your Network 17

24 About this task The Traffic Analysis tab displays the ADS traffic content for the selected group. The information displayed for the selected assets is based over the last 24-hour time frame. Select the group for which you want to view Traffic Analysis, and then select Traffic Analysis from the Go to list. Section E: SecurityFusion Module Impact Analysis The SecurityFusion Module greatly increases your ability to identify and respond to critical threats quickly. Using correlation and analysis techniques, the Module escalates high impact attacks and critical attack patterns to help you focus on the most important attack activity. Note: The SecurityFusion Module is a separately purchased, add-on component. Impact analysis Impact analysis is the process of determining whether an attack succeeded. As an intrusion detection sensor detects an attack, the Module correlates the attack with information about the host such as operating system, vulnerabilities, and responses taken by host agents to verify the success or failure of the attack. This information is displayed in the Status column of the Analysis view. Section F: Locating Assets and Agents If you are monitoring traffic in an enterprise environment, you may need to locate a group, asset, or agent. The SiteProtector system provides a quick way to search for agents and assets using the Find option. Find option Depending on where you select the asset or agent, the Find option lets you navigate to a group or perform a keyword search. The Find option is located on the Edit menu. Topics Finding groups for an agent or asset Finding assets in a group on page 19 Finding groups for an agent or asset Use the Find Groups window to find the groups and subgroups that a specific agent or asset belongs to. About this task In the Agent or Asset view, you can easily find the groups and subgroups that a specific agent or asset belongs to. You can then navigate to one of the groups from the Find Group window. You can also search for assets within a group and find out any other groups the asset belongs to. 18 SiteProtector System: Security Analysts' User Guide

25 1. Select the agent or asset. Tip: You can select multiple agents or assets and find groups for all of them. 2. Click Edit > Find. 3. Use the Expand and Collapse buttons to expand or collapse the group tree. 4. Select a group to navigate to, and then click OK. Finding assets in a group Use the Find Assets window to search for assets within a group and to find any other groups they belong to. 1. Select the group, and then click Edit > Find. 2. Type the name of the asset in the Pattern box, and then click Find. 3. Use the Expand or Collapse buttons to expand or collapse the group tree. 4. To navigate to a group, select the group from the results list, and then click OK. Chapter 2. Monitoring Your Network 19

26 20 SiteProtector System: Security Analysts' User Guide

27 Chapter 3. Reporting This chapter provides guidelines and procedures for creating reports in the SiteProtector system. Creating reports Create reports from templates in the Report view to examine trends, to establish consistent reports, or to format data. Before you begin You must purchase a separate license to use the SiteProtector Reporting feature. About this task Use a template in the Report view to create a report if: v Data is not available in the Analysis view, such as permissions data v Formatting is important v You need to see trends v You plan to produce the report multiple times v You want to allow other SiteProtector users to access the report v You want to establish consistency in reporting v You want to reuse report settings Results Information about a report appears in the following places in SiteProtector: v Saved templates are listed in the Templates pane. v Reports that have been run and saved are listed in the My Reports pane. v Scheduled reports are listed in the Schedules pane. What to do next In the report view, perform one of the following tasks: Selecting a template Templates have predefined filter and column settings. 1. In the Report view, click Templates. 2. In the Templates pane, select a report template. Tip: Select a template to see the template description in the Template Detail pane. Creating a new report When you create a new report, the report is generated immediately and displayed in the Report viewer inside the Console. Copyright IBM Corp. 1994,

28 1. In the Report view, select a template, and then click Action > New Report. 2. In the New Report window, click the General icon, and then type a meaningful Report Name and Description. 3. Optional: Click the Parameters icon, and configure any of the available tabs: Tab Groups Content Settings Display Options Configure Groups you want to report data for Filters, columns of data to include, sort settings, and Analysis perspective Maximum number of rows you want to display in your report Note: You can only define the maximum number of rows to display for reports generated from Analysis category templates. CAUTION: A scheduled report is performed outside of the Analysis view. Therefore, it is possible to select a set of parameters that requests an excessive amount of data, resulting in a report run-time failure. This is highly dependent on the specific SiteProtector hardware environment as well the event rate from managed agents. 4. Optional: Click the Chart icon and select the appropriate formatting choices. Note: Charts are only available for reports generated from Analysis category templates. Tab Select Chart Type Select Series Tips When you select a dimension for your chart, consider using 2D with depth or 3D for charts in reports you plan to share, such as executive reports, because they are more visually engaging. Consider using 2D for charts when you analyze the data because there is less ambiguity about data values. Select Enable Grouping when you have multiple Y-Axis series: the Y-Axis series is summed according to the X-Axis series. Example: If you are charting event counts and severity, you can enable grouping to see one bar, point, or slice for High Severity, with a total event count for all High Severities. If you do not enable grouping, the chart includes multiple bars, points, or slices for each event with a High Severity and an event count specific to that single high severity event. Format Options v When you have multiple Y-Axis series: v 1. Select Color by Y-axis Series to make each bar, point, or slice a different color in the chart. 2. Select Show Legend to show what each color represents. Specify a Maximum number of X-Axis data points to prevent your chart from containing too much data to reasonably view in a chart. A good maximum number of X-Axis data points to display is 20. Important: When you exceed the maximum number of X-axis data points, only part of the data in the report is displayed in the chart. To ensure that all of your data is included in your chart, verify that your chart has fewer than the maximum number of X-axis data points. 5. Click OK. Scheduling a report Schedule a report to run in the background, to run at a later time, or to run on a recurring schedule. 22 SiteProtector System: Security Analysts' User Guide

29 1. In the Report view, select a template, and then click Action > Schedule Report 2. In the Schedule Report window, click the General icon, and then type a meaningful Report Name and Description for the report. 3. Optional: Click the Parameters icon, and configure any of the available tabs: Tab Groups Content Settings Display Options Configure Groups you want to report data for Filters, columns of data to include, sort settings, and Analysis perspective Maximum number of rows you want to display in your report Note: You can only define the maximum number of rows to display for reports generated from Analysis category templates. CAUTION: A scheduled report is performed outside of the Analysis view. Therefore, it is possible to select a set of parameters that requests an excessive amount of data, resulting in a report run-time failure. This is highly dependent on the specific SiteProtector hardware environment as well the event rate from managed agents. 4. Optional: Click the Chart icon and select the appropriate formatting choices. Tab Select Chart Type Select Series Tips When you select a dimension for your chart, consider using 2D with depth or 3D for charts in reports you plan to share, such as executive reports. Consider using 2D for charts when you analyze the data. Select Enable Grouping when you have multiple Y-Axis series: the Y-Axis series is summed according to the X-Axis series. Example: If you are charting event counts and severity, you can enable grouping to see one bar, point, or slice for High Severity, with a total event count for all High Severities. If you do not enable grouping, the chart includes multiple bars, points, or slices for each event with a High Severity and an event count specific to that single high severity event. Format Options v When you have multiple Y-Axis series: v 1. Select Color by Y-axis Series to make each bar, point, or slice a different color in the chart. 2. Select Show Legend to show what each color represents. Specify a Maximum number of X-Axis data points to prevent your chart from containing too much data to reasonably view in a chart. A good maximum number of X-Axis data points to display is 20. Important: When you exceed the maximum number of X-axis data points, only part of the data in the report is displayed in the chart. To ensure that all of your data is included in your chart, verify that your chart has fewer than the maximum number of X-axis data points. 5. Click the Schedule icon and select the appropriate options. If you want the report to run... one time Then Select Run Once. 2. If you want the report to run later, select the Start time. on a recurring schedule 1. Select Daily, Weekly, ormonthly. 2. Select the time to Start running the report. 3. If you want to limit the number of occurrences, select the End by date. Chapter 3. Reporting 23

30 6. Optional: Click the Notification icon. Select or type the address of the users you want to send the report to. 7. Click OK. Creating templates Create templates with custom data filters and formatting options that meet your specific needs for a report. Before you begin Install the Business Intelligence and Reporting Tools (BIRT) reporting system, version from About this task You can create a template by running a report from a custom Analysis view, or by using BIRT, an open source Eclipse-based reporting system. What to do next You can create a custom view in the Analysis view and run a report from that custom view, or you can export an existing template from the Console, modify the settings of the template in BIRT, and then import the modified template back into the Console. Exporting a template Export an existing template into a directory to modify it. 1. In the Report view, click the Templates icon and click Action > Export Note: You cannot export templates that have been derived from an Analysis view. 2. Select a directory to Save in and type a meaningful File name for the report. 3. Click Save. Importing a template Import a new or modified template into the Console. 1. In the Report view, click the Template icon. 2. Click Action > Import 3. In the Import Report Template window, type a meaningful Template Name and Template Description, select a category to display the new template in, and then browse to the report design file you want to import. Tip: The file extension for a design file is.rptdesign 4. Click Open. Deleting reports, templates, and schedules Delete reports, templates, and schedules that are no longer useful. 24 SiteProtector System: Security Analysts' User Guide

31 About this task There is a difference between deleting a template, deleting a report, and deleting a schedule. Important: Deleting a template also deletes saved reports and schedules that are related to the template. What to do next In the Report view, perform one of the following tasks: Deleting a report Delete a saved report when data in the report is no longer useful. About this task Deleting a report does not delete the template or the schedule related to the report. 1. In the Report view, click the My Reports icon. 2. Select the report you want to delete, and then click Edit > Delete 3. In the Delete Report confirmation window, click OK. Deleting a schedule Delete a schedule to stop SiteProtector from producing a report that has been scheduled. About this task Deleting a schedule does not delete the template or the saved reports that are related to the schedule. 1. In the Report view, click the Schedules icon. 2. Select the schedule you want to delete, and then click Edit > Delete. Deleting a template Delete a template created by a SiteProtector user when the template is no longer useful. About this task Deleting a template also deletes the saved reports and schedules that are related to the template. 1. In the Report view, click the Templates icon. 2. Select the report template you want to delete. 3. Click Edit > Delete. Note: Only templates created by SiteProtector users can be deleted. Finding reports Find a report to open, rerun, schedule, save, delete, or set the report as a sample image. Chapter 3. Reporting 25

32 About this task If you have saved a report or scheduled a report to run, you can find the report in the My Report pane of the Report view. Otherwise, you must rerun the report. 1. In the Report view, click the My Reports icon. Tip: Click the column headers to sort reports. 2. Optional: Select the report, click Action, and then select one of the following options: v Open v Rerun report v Schedule Report v Set as sample image v Save v Delete Sending reports in You can configure scheduled reports to be sent through when the report runs or you can send a report in directly from the Report Viewer. Before you begin You must schedule a report or generate a report to send the report in an . Send a report in from one of the following locations in the Console: Option Description In the Report Viewer When you create a new report, or open a saved report, click Action > report, and then select or type user addresses for users you want to send the report to in an . Scheduled report in Report view Schedule a report from the Analysis view or the Report view. In the Schedule Report window, click the Notification icon, and then select or type the address of the users you want to send the report to. Setting a report sample image Set a report as the sample image for a template so that it is displayed as the sample image in the Template Detail pane. 1. In the Report view, click the My Reports icon. Tip: Click the column headers to sort reports. 2. Optional: Select the report, click Action > Set as Sample Image. 26 SiteProtector System: Security Analysts' User Guide

33 Managing template permissions Use permissions for a report template to define which users or groups can view or control the report template. 1. In the Report view, click the Templates icon, select a template, and then click Action > Permissions. 2. In the Manage Permissions window, select a user or group, and then select permissions for the user or group. Note: If a user or group is not displayed in the Users and/or Groups box, click Add to add the user or group. 3. Optional: Click Advanced to change the current owner of the template. Communicating data from the Analysis view Create ad hoc reports from the Analysis view, export data to work outside of SiteProtector, or generate custom reports from the Analysis view that you can share. About this task Consider exporting data when you v Want to use a reporting tool outside of SiteProtector v Need to share data with an audience that does not have access to SiteProtector, but needs to manipulate the data v Think formatting is not important v Want to include remediation information for each event Consider creating a new report or scheduling a report when you v Plan to produce the report multiple times v Want to allow other SiteProtector users access to the report v Think formatting is important Tip: To report small amounts of data, you can copy and paste data into external applications. For example, if you have a single workstation that has a vulnerability and you want to quickly notify the system administrator, you can copy and paste the data into an . Example v You have many assets that are owned by several system administrators. You export data into a spreadsheet and send the spreadsheet to all the system administrators. v You have been asked to share your Site's security posture with management. You create a new report because the formatted data is easier to consume and has a more professional look. What to do next In the Analysis view, perform one of the following tasks: Exporting data Export data in the Analysis view to work with large amounts of data, to work with data outside of SiteProtector, and to work with data that is not formatted. Chapter 3. Reporting 27

34 About this task Exporting data is the same as exporting a view. Tip: To schedule data exports click Action > Schedule Export. 1. In the Analysis view, click Action > Export. 2. In the Export window, type a File path, select a File Type, and specify what data to export in the Exported Content section. Note: You can only exclude columns that are already in the Analysis view. To include a column in the exported data, go back to the Analysis view and add the column before you export the data. 3. Optional: Select Include Security Information to include remediation information for each event. Scheduling exports of data In an Analysis tab, you can schedule a job to export data. 1. Click Action > Schedule Export. 2. Click the Parameters tab. 3. In the Output Parameters area, type a File Name, select a File Type, and then select the time for which you want data to appear in the file. 4. Select a Time Filter to specify the time frame for the data you want to export. 5. In the Analysis Data Export Parameters area, select an Analysis View and filters. 6. Click the Schedule tab. 7. Select a Recurrence pattern, Start time, and Range of recurrence. 8. Click OK. Creating reports in the Analysis view Create ad hoc reports and custom reports in the Analysis view. When you create a new report, that report is generated immediately and is displayed in the Console. 1. Click Action > New Report. 2. In the New Report window, click the General icon, and then type a meaningful Report Name and Description for the report. 3. Optional: Click the Chart icon and select the appropriate formatting choices. Tab Select Chart Type Select Series Tips When selecting a dimension for your chart, consider using 2D with depth or 3D for charts in reports that you plan to share, such as executive reports, because they are more visually engaging. Consider using 2D for charts when you analyze the data because there is less ambiguity about data values. Select Enable Grouping when you have multiple Y-Axis series. The Y-Axis series is summed according to the X-Axis series. Example: If you are charting event counts and severity, you can enable grouping to see one bar, point, or slice for High Severity, with a total event count for all High Severities. If you do not enable grouping, the chart includes multiple bars, points, or slices for each event with a High Severity and an event count specific to that single high severity event. 28 SiteProtector System: Security Analysts' User Guide

35 Tab Tips Format Options v When you have multiple Y-Axis series: v 1. Select Color by Y-axis Series to make each bar, point, or slice a different color in the chart. 2. Select Show Legend to show what each color represents. Specify a Maximum number of X-Axis data points to prevent your chart from containing too much data to reasonably view in a chart. To ensure that all of your data is included in your chart, verify that your chart has fewer than the maximum number of X-axis data points. Important: When you exceed the maximum number of X-axis data points, only part of the data in the report is displayed in the chart. 4. Click OK. Scheduling reports in the Analysis view Schedule reports to run in the background, to run at a later time, or to run on a recurring schedule. 1. In the Analysis view, click Action > Schedule Report. 2. Click the General icon, and then type a meaningful Report Name and Description. 3. Optional: Click the Chart icon and select the appropriate formatting choices. Tab Select Chart Type Select Series Tips When selecting a dimension for your chart, consider using 2D with depth or 3D for charts in reports that you plan to share, such as executive reports because they are more visually engaging. Consider using 2D for charts when you analyze the data because there is less ambiguity about data values. Select Enable Grouping when you have multiple Y-Axis series. The Y-Axis series is summed according to the X-Axis series. Example: If you are charting event counts and severity, you can enable grouping to see one bar, point, or slice for High Severity, with a total event count for all High Severities. If you do not enable grouping, the chart includes multiple bars, points, or slices for each event with a High Severity and an event count specific to that single high severity event. Format Options v When you have multiple Y-Axis series: v 1. Select Color by Y-axis Series to make each bar, point, or slice a different color in the chart. 2. Select Show Legend to show what each color represents. Specify a Maximum number of X-Axis data points to prevent your chart from containing too much data to reasonably view in a chart. To ensure that all of your data is included in your chart, verify that your chart has fewer than the maximum number of X-axis data points. Important: When you exceed the maximum number of X-axis data points, only part of the data in the report is displayed in the chart. 4. Click the Schedule icon and select the appropriate options. If you want the report to run... one time Then Select Run Once. 2. If you want the report to run later, select the Start time. Chapter 3. Reporting 29

36 If you want the report to run... Then... on a recurring schedule 1. Select Daily, Weekly, ormonthly. 2. Select the time to Start running the report. 3. If you want to limit the number of occurrences, select the End by date. 5. Optional: Click the Notification icon. Select or type the address of the users you want to send the report to. 6. Click OK. 30 SiteProtector System: Security Analysts' User Guide

37 Chapter 4. Identifying and resolving network vulnerabilities This chapter discusses how to identify and respond to threats. This chapter is not a comprehensive guide for developing a vulnerability assessment plan. For more information on developing a vulnerability assessment plan, contact Professional Services at IBM Security. Developing vulnerability assessment plans This topic explains what to consider as you develop a vulnerability assessment plan, and provides an overview of the vulnerability identification and resolution process. Importance of a vulnerability assessment plan To effectively identify and resolve vulnerabilities, IBM Security recommends that you establish a vulnerability assessment plan. Consider the following as you develop your plan: v which hosts to include in scans v frequency of scans v who is responsible for affected systems v process by which vulnerabilities are reported, tracked, and resolved v vulnerability assessment team's area of responsibility, including organizational structure of team relationship to upper management services provided Diagram of vulnerability identification and resolution process The following figure illustrates the vulnerability identification and resolution process: Vulnerability data generated by the SiteProtector system This topic explains the types of vulnerability data generated by the SiteProtector system, categories of vulnerabilities, and vulnerabilities associated with specific attacks. Copyright IBM Corp. 1994,

38 Definition: vulnerability A vulnerability is a known flaw on your network that can be exploited. Vulnerability data types The types of vulnerability data generated by the SiteProtector system are as follows: Network-based Attackers usually exploit these vulnerabilities by accessing a service that is exposed to other machines on the network. Network-based vulnerabilities can occur on both hosts and networks. Host-based Attackers exploit host-based vulnerabilities by logging onto the host, as a local or a remote user. Categories of vulnerabilities Vulnerability categories are as follows: Vendor-specific Commercial software or hardware that is not secured properly such as software bugs, missing operating system patches, and services. Improper configuration Improperly configured software and hardware, such as poorly defined policies for password creation or unauthorized changes to system configurations, including uninstalling patches and hot fixes. Improper user activity Unauthorized use or neglect on the part of users sharing directories to unauthorized parties, failing to use or update antivirus software, and using dial-up modems to circumvent firewalls. Vulnerabilities associated with specific attacks The following table provides descriptions of vulnerabilities associated with specific attacks: Vulnerability Backdoor Buffer or field overflow Default accounts and inappropriate access privileges Weak access control Information vulnerability Description A hole in the security of a system or application due to one of the following: v a security flaw v a hidden means of access A system flaw that lets an attacker submit code into a variable that exceeds the field length of the variable. The code then runs, providing access for the attacker. A user account enabled by default, predefined accounts, or accounts with access to more resources and commands than is appropriate for the level of access. A system misconfiguration that weakens access control, such as permitting the use of blank or null passwords, or easily guessed passwords. A system flaw that provides reconnaissance information about a host, such as the version of an operating system. Gathering information about vulnerability events After you scan your network, you must gather information about vulnerability events generated by the scan or scans. Use analysis views to navigate to important details about vulnerability events. 32 SiteProtector System: Security Analysts' User Guide

39 Reference: For more information about the event analysis, refer to Section B: Analyzing Events on page 7. Deciding whether to resolve vulnerabilities This topic includes questions to help you in determining which vulnerabilities to resolve. Deciding whether to resolve vulnerabilities Use the following questions when determining whether a vulnerability should be resolved: Does the vulnerability affect critical assets? The most important factor in determining whether to resolve a vulnerability is whether the host or segment affected by the vulnerability is critical. What s the worst-case scenario if this vulnerability were exploited? The impact of an attack can vary. Some vulnerabilities allow attackers to potentially disable all the critical hosts in an organization while other vulnerabilities provide attackers with information that has little or no value. How widely used is the platform that is affected by the vulnerability? The number of hosts running the platform affected by the vulnerability may determine whether this vulnerability will be exploited. Generally, the more hosts that are running a vulnerable platform, the more likely it is that the platform will be attacked. Does the vulnerability require advanced skill to exploit? Most attackers lack advanced hacking techniques; therefore, they are not likely to exploit a vulnerability if it requires advanced skills. Can the vulnerability be exploited by an outsider? Vulnerabilities that can be exploited by users remotely, without using local account privileges, open the door to a large number of potential attackers. Repairing and mitigating vulnerabilities You can often repair or mitigate vulnerabilities. When you decide to resolve a vulnerability, do one of the following: v repair the vulnerability v mitigate the risk of the vulnerability Repairing The most effective way to resolve a vulnerability is to repair it. When you repair a vulnerability, you repair or reconfigure the system so that the system affected is no longer vulnerable. Mitigating When you mitigate a vulnerability, you attempt to lessen the impact of the vulnerability, but you do not eliminate it. Consider mitigating vulnerabilities as a temporary measure. Exceptions and incidents The SiteProtector system provides a simple way to categorize vulnerabilities, as follows: v If you choose to resolve a vulnerability, categorize it as an incident. v If you choose to ignore a vulnerability, categorize it as an exception. Chapter 4. Identifying and resolving network vulnerabilities 33

40 Baseline feature Consider using the baseline feature to track vulnerabilities that have been repaired or mitigated. If a vulnerability cannot be resolved immediately In special situations, consider categorizing a vulnerability as an exception especially if you know that a significant period of time will elapse before you can resolve it. Resolving vulnerabilities Use the following table as a guide when resolving vulnerabilities: Methods Task Incident or Exception Repair vulnerability Mitigate vulnerability Apply vendor-supplied patches or upgrades Reconfigure vulnerable systems Monitor vulnerability for a specified period of time Turn off systems that run vulnerable services Adjust firewall rules to prevent access to vulnerable systems Note: This approach is not foolproof. Attackers can circumvent firewall rules to access vulnerable hosts. Categorize as an incident until patch or upgrade has been implemented and tested. 1. Categorize as an incident until vulnerable systems have been successfully re-configured. 2. Categorize as an exception and schedule it to expire when the system can be successfully patched or upgraded. Categorize as an incident. 1. Categorize as an incident until vulnerable services are turned off. 2. Categorize as an exception and schedule it to expire when the system can be successfully patched or upgraded. 1. Categorize as an incident until vulnerable services are blocked. 2. Categorize as exception and schedule it to expire after the system can be successfully patched or upgraded. Reference: For more information on repairing vulnerabilities, refer to Implementing upgrades and patches on page 35. Creating a plan of action After you decide how to repair or mitigate a vulnerability, you should create a plan that includes detailed information about the vulnerability, how you plan to resolve it, and how you plan to test it after it is resolved. How to create an action plan The following is a list of information to include in an action plan: v detailed description of the vulnerability v list of systems affected by the vulnerability 34 SiteProtector System: Security Analysts' User Guide

41 v description of how you will repair or mitigate the vulnerability, including detailed implementation procedures, such as designating responsible parties and contacting system owners v description of how you will assess the impact of the solution, including testing and rollback procedures Implementing upgrades and patches After you create an action plan for repair, you should implement upgrades and patches. Definition: upgrade An upgrade is a new version of, or an addition to, a hardware or software product that is already installed. Upgrades usually include new features and redesigned components. Definition: patch A patch is a temporary fix for software or hardware, which usually addresses a specific bug or flaw. Patches usually do not include new features or redesigned components. How to ensure successful implementation To implement upgrades and patches successfully, you must do the following: v test the new software or reconfiguration v obtain cooperation from system owners and business managers who are responsible for devices being patched or upgraded Questions to consider when implementing upgrades and patches Use the following questions as a guide when implementing upgrades and patches: v Will the system be more vulnerable while it is being repaired? v Will patched and unpatched systems co-residing on your network present incompatibilities? v Could the fix you are implementing to repair one vulnerability create another? v Will the fix require extensive testing? If so, have you allowed enough time? Next step Re-scan your network to determine if vulnerabilities have been repaired successfully. Chapter 4. Identifying and resolving network vulnerabilities 35

42 36 SiteProtector System: Security Analysts' User Guide

43 Chapter 5. Managing Scans This chapter discusses how to implement and manage network scans in your environment using the IBM Internet Scanner or IBM Proventia Network Enterprise Scanner applications. Identifying hosts on your network This topic explains how to identify hosts on your network. To identify hosts on your network, consider performing discovery scans as follows: v after you install the SiteProtector system to generate host information and map out your network v periodically to identify new hosts on the network Definition: discovery scan Discovery scans use the IBM Internet Scanner or IBM Proventia Network Enterprise Scanner discovery policies. These policies identify the host operating system, services currently running on the system, and perform basic vulnerability checks. Purpose of launching discovery scans Discovery scans provide useful information about hosts on your network without running the time-consuming checks that are enabled in other IBM Internet Scanner or IBM Proventia Network Enterprise Scanner policies. A discovery scan can help you to do the following: v identify new hosts on a network v determine the following: how to segment scans across network and which policies to use whether host operating systems are up-to-date or in compliance with company standards whether the users accessing the network are authorized to do so whether you have sufficient IT staff to support all the platforms on your network Host information provided by discovery scans Discovery scans add the following information to the host table: v IP Address v NetBIOS Name v DNS Name v OS Name v NetBIOS Domain Name Note: If a host does not respond to IBM Internet Scanner or IBM Proventia Network Enterprise Scanner connection requests, it will not be added to the host table. Copyright IBM Corp. 1994,

44 Ensuring that vulnerability data is complete and accurate This topic provides guidelines for ensuring that your vulnerability data is complete and accurate. To ensure that vulnerability data is complete and accurate, do the following: v maintain scan consistency v ensure that all hosts are accessible v use the highest level of user access possible Maintaining consistency between scans To maintain consistency, consider doing the following: v use the same policy and XPU level as the previous scan when verifying that vulnerabilities have been repaired v use the same account privileges and scanner configuration as the previous scan v apply XPUs and scanner policies between scan cycles v vary scan times to scan hosts that may not be available during your normal scanning schedule v coordinate your scanning with intrusion detection efforts so that you identify vulnerabilities that might be exploited Ensuring hosts are accessible To ensure that hosts are accessible, do the following: Ensure that hosts are available A host may be unavailable due to the following conditions: v turned off v not connected to the IP network v running nonstandard services v communicating through nonstandard ports Ensure that firewalls are allowing communication Certain firewall configurations block the traffic IBM Internet Scanner or Proventia Network Enterprise Scanner uses to establish connections with hosts, such as the following: v ICMP requests v communication from the host used by the IBM Internet Scanner or IBM Proventia Network Enterprise Scanner instance Note: You can achieve best performance if the IBM Internet Scanner or IBM Proventia Network Enterprise Scanner instance is located in the same segment as the assets you are scanning. Use highest level of user access To access all system resources, IBM Security recommends that you escalate access rights when you scan. Use domain administrator privileges when scanning critical domains or hosts. Scans using domain administrator rights can require significant time to finish. Scheduling vulnerability scans Schedule scans when they will least impact your network, and when they can generate useful data. 38 SiteProtector System: Security Analysts' User Guide

45 Considerations When preparing a vulnerability scan schedule, consider doing the following: Coordinate with system owners Always coordinate scan times with system owners. Allow for multiple time zones If you have a network that services more than one time zone, consider staggering scan sessions so that you accommodate users in all the time zones. Adhere to company policy Schedule your scans so that you avoid scanning when devices are not available. Company policy may require that certain devices, such as desktops, be shut down at the following times: v at the close of business v during periodic maintenance Avoid critical servers during peak times To avoid impacting system performance, do not scan critical application servers during peak times when large numbers of users may be attempting to access those servers. When to scan certain hosts The following table provides some suggestions for scheduling scans: Time of day Early morning Midday Type of scan Desktops Non-critical NT and UNIX servers Evening/late night v Critical application servers v Printer servers Running background scans This topic describes background scans. Background scans are automatic, recurring scans that run on separately defined cycles for discovery and for assessment scanning. Recommendations Use a small range of IP addresses to keep the scan time short. Include assets that are known to have vulnerabilities, if possible. Task overview The following table describes the five-task process for setting up background scanning: Task Affected Policy Policy Changes 1 Discovery Enable background discovery scanning and define the range of IP addresses to scan. 2 Assessment Enable background assessment scanning and define which checks to run. Chapter 5. Managing Scans 39

46 Task Affected Policy Policy Changes 3 Scan Window Optionally, define the days and hours that scanning is allowed. 4 Scan Control Optionally, define when the first scanning cycle begins, and the length of each scanning cycle. 5 All Save policies and monitor scans. Reference: For detailed information on background scanning, refer to the IBM Proventia Network Enterprise Scanner User Guide. Reducing the time required to run scans This topic provides some scanning efficiency suggestions. Network scans can generate large amounts of data. They can also be time consuming and can impact the performance of the IBM Internet Scanner or Proventia Network Enterprise Scanner instance and the network. To reduce the time required to run scans, consider doing the following: v improve network bandwidth and accessibility v limit the number of hosts included in scans v reduce default policy levels or limit the number of vulnerability checks in policy Improving network bandwidth and accessibility To improve network bandwidth and accessibility, consider doing the following: Improve network bandwidth How quickly devices on your network respond to packets sent to them affects scan times. Ping responses or Internet Control Message Protocol (ICMP) echo requests that are longer than 50 milliseconds can increase scan times significantly. If you experience slow ping response, determine whether your network bandwidth is sufficient. Improve accessibility Perimeter scans that are configured to scan without ping responses take longer. If you must reduce scan times, consider moving the scanning device to a location inside the firewall. Limit hosts included in scans To limit the hosts included in scans, consider doing the following: Limit the overall number of hosts IBM Security recommends that you scan no more than 2500 hosts per scan session. If you exceed this number, the scans may not be completed successfully. The maximum number of hosts you are able to scan in one session will vary according to the performance of your network and the device on which the scanner engine is installed. Limit domain controller hosts Domain controller hosts with a large registry of user accounts can take longer to scan because of the user account enumeration and password checking. Consider disabling these checks when scanning domain controllers or removing these hosts from scans. Reducing default policy levels Medium to high level scan polices take longer to run than low level policies. As a last resort, consider reducing default policy levels or limiting the number of vulnerability checks in the policy. 40 SiteProtector System: Security Analysts' User Guide

47 Chapter 6. Detecting Suspicious Activity This chapter describes several SiteProtector system views to use as starting points for detecting suspicious activity on your network. This chapter provides guidelines for using SiteProtector system analysis views and filtering tools. Goals of detecting suspicious activity The goals of detecting suspicious activity are as follows: v monitor high level patterns to determine whether you need to monitor certain activity more closely v look for early indicators of attack severity and scope while you continuously filter, sort, and correlate events v determine whether you have sufficient justification to take additional actions, such as officially tracking an incident or starting a formal investigation Section A: Suspicious Activity Suspicious activity can come from a variety of sources. Use the descriptions in this section to help you identify and categorize suspicious activity when you monitor your network. Iterative process Detecting suspicious activity is an iterative process. Perform the following tasks in an iterative fashion when you are determining whether an activity is suspicious: v alternate between Event Analysis views and guided questions v create baselines and exceptions to exclude activity that is not part of your analysis Authorized activity Authorized activity is normal activity that may appear to be suspicious but is actually harmless. Consider creating an exception for authorized activity or including this activity in the Console baseline. See Section C: Filtering Activity from Analysis Views on page 49. Example: A DNS zone transfer between authorized DNS servers may trigger an event, but in most cases it is authorized activity. A DNS transfer that is initiated by an external IP address, however, is unauthorized activity. Unauthorized activity Unauthorized activity is abnormal behavior that can harm your enterprise. Unauthorized activity is sometimes erroneously categorized as a false positive. However, unauthorized activity is usually cause for concern and it may require further investigation and remediation. The following table describes unauthorized activities: Unauthorized Activity misuse Description The perpetrator does not intend to cause harm to the organization but may have unknowingly created vulnerabilities. Typically, this activity is caused by lack of due diligence, but not gross negligence. An example is an administrator who attempts to configure a firewall but because of oversight or ignorance leaves an organization's assets open to attack. Copyright IBM Corp. 1994,

48 Unauthorized Activity abuse malicious activity Description The perpetrator does not intend to cause harm to the organization, but often knows that the activity is wrong. Typically, this activity is caused by blatantly negligent behavior or by behavior that clearly violates laws or an organization's code of conduct. Examples of abuse are a user who browses the Web for pornography on the company's intranet or an administrator who neglects to configure a firewall and leaves assets vulnerable to attacks. The perpetrator intends to do harm to the organization and knows that his or her activity is wrong. Examples are an attacker who starts a denial of service attack against a company's intranet or an internal user who intends to profit from privileged financial information that he or she obtained illegally from the company's accounting servers. Threat assessment and investigation deals primarily with detecting and investigating malicious activity. Section B: Monitoring Event Analysis Views Analysis views provide good starting points for detecting suspicious activity because they provide multiple perspectives with an appropriate level of detail. This section provides descriptions of selected analysis views and guidelines for using them. Related information See Section B: Analyzing Events on page 7 for procedures on using guided questions and managing analysis views. Guidelines in this section The guidelines in this section may apply to many tasks that are performed during threat analysis and remediation, in addition to event detection. Choosing the traffic to monitor and correlate The traffic you choose to monitor and correlate with event analysis views can depend on a number of factors. This topic provides guidelines for choosing the traffic to monitor and for manually correlating events by source. Important: The process of organizing and prioritizing your assets is an integral part of planning and assessing your network security. You should have performed many of these tasks when you installed and configured the SiteProtector system. Advantages of a grouping structure A grouping structure can help you protect your assets more efficiently by grouping hosts and sensors according to tasks you perform frequently. Typically, a Site uses more than one structure, such as geography and topology, to group assets and sensors. Grouping assets for monitoring The following table lists some criteria for grouping assets for monitoring: Grouping Structure Topology Description Use the topology criteria to monitor traffic based on where it originated. This is an effective and commonly used criteria for monitoring internal assets (intranet) or external assets. These areas may be further divided according to topology, such as DMZs, VPNs, partner extranets, and internal gateways. 42 SiteProtector System: Security Analysts' User Guide

49 Grouping Structure Asset criticality Geography Business function Description You may choose to monitor mission critical assets more closely than less critical assets. In most cases, asset criticality also influences how you investigate these assets and respond to attacks against them. The SiteProtector system lets you assign a criticality rating to an asset in Asset Properties. Use the geography structure to group assets according to the physical locations in your organization. This structure may apply to the city, state, or continent your assets are located in, and lets you compare events from different locations in your organization. Use the business function structure to monitor hosts located in specific departments, such as sales and accounting, that may contain critical information or process sensitive traffic. Correlating events by source One of the goals of event detection is to determine the source of suspicious activity. Event analysis views provide several source indicators. Source indicators can help narrow your search for the source of suspicious activity but may not always lead you directly to the source. Examples of source indicators are as follows: v an attacker's IP address that is registered to an Internet Service Provider (ISP) v the location of an agent that indicates where in the data stream suspicious activity was detected (but not the origin) v firewall events that indicate a series of unsuccessful logins Summary view The Summary view displays a high-level summary of a selected Site or group. Use data in this view to perform high-level monitoring of Site or group events. What is the Summary view? The Summary view is divided into several portlets that each provide a snapshot of an aspect of your security, such Vulnerability History by Day or Today's Event Summary by Event Name. Many of these views are based on a specific time frame. You can modify the data displayed in most of the portlets to change the timeframes and include exceptions. You can also navigate from most of the portlets directly to the source of the data in the SiteProtector system. Portlets in the Summary view By default, the Summary view contains six portlets. However, you can add and remove up to 16 portlets. Adding or removing portlets You can add or remove portlets in the Summary view. Before you begin Tip: You can configure the Summary view to display up to 16 portlets and specify how content is updated from the Tools > Options menu. 1. In the Summary view, click Action. 2. Select or clear a portlet option from the menu. Chapter 6. Detecting Suspicious Activity 43

50 Tip: You can also right-click the title bar in a portlet, and then select or clear a portlet option from the pop-up menu. What to do next Note: On the Action menu, check marks appear next to portlets that are enabled in the Summary view. Modifying portlet information You can specify the time periods and select whether to include exceptions for the data displayed in some of the portlets in the Summary view. 1. To adjust the time period for the data displayed in a portlet, select a number from the Number of Days, Number of Weeks, Number of Months, oragents Active in Days list in the portlet. The data in the portlet immediately refreshes based on the new time frame you selected. 2. To include events that are exceptions in the data displayed in a portlet, select the Include Exceptions check box in the portlet. The data in the portlet immediately refreshes to include the event exceptions. Note: An exception is an event or an attack pattern that you do not consider a risk to your network or hosts. Examples of exceptions include the following: v false positives v a vulnerability you expect to eliminate soon What to do next Note: You cannot modify the data displayed in the System Health, Site Summary, Group Summary, Scan Progress, Ticket Status, and Offline / Stopped Agents portlets. Navigating from the portlets You can navigate from most of the portlets in the Summary view to the source of the data in SiteProtector. Do one of the following in the Summary view: v Click a portlet title to see a detailed view of all the data in that portlet. 44 SiteProtector System: Security Analysts' User Guide

51 v Click the data (including graphs) in a portlet to see a detailed view of just that specific data. Example Examples: v If you click the Agent Event History by Day portlet header, the Event Analysis-Details view appears, filtered by the start date. v If you click a bar in the graph in the Agent Event History by Day portlet, the Event Analysis-Details view appears, filtered by the data you clicked in the portlet. What to do next Notes: v Due to the specific data displayed in the portlet, you cannot click the portlet titles to navigate from the System Health, Available Updates, Scan Progress, oroffline / Stopped Agents portlets. However, you can click the data within those portlets to navigate to the detailed view of that specific data. v You cannot navigate from the Site Summary or Group Summary portlets. Event Name view The Event Analysis - Event Name view provides a good starting point for determining the types of events detected on your network and for customizing analysis views for specific tasks. Use this view during the early stages of event detection. What is the Event Name view? The Event Name view provides the tag name of the event, status (this is most useful if SecurityFusion is enabled), severity, event counts, and date and time. Example of the Event Name view The following figure provides an example of the Event Name view. When combined with statuses from the SecurityFusion Module, the Event Name view can provide an accurate snapshot of your network's security: Chapter 6. Detecting Suspicious Activity 45

52 Guidelines for viewing the Event Name view Use the following guidelines to view events in the Event Name view: v Filtering for specific attacks If you are monitoring for a specific exploit, the Event Name view can provide a good starting point. For example, if you have determined from your security research that a widespread attack is underway that uses a combination of a Microsoft remote procedure call and an SQL injection attack, you could filter the Event Name view to show only events that trigger these signatures. See Section C: Filtering Activity from Analysis Views on page 49. v Filtering by severity or status If the SecurityFusion Module is enabled and your vulnerability data is current, sort the view by the degree of vulnerability or severity, with the most vulnerable or most severe events appearing first in the list. This rearranges your view so that the events that will most likely require further action appear first in the list. Tip: Click the column name while pressing the SHIFT key to sort additional columns in the same view. v Customizing the Event Name view for greater source correlation The Event Name offers several possibilities for customization. Consider adding the Sensor Name, SourceIP, and DestinationIP columns to the Event Name view, and sort the view by the Event Name column. Use the Sensor Name column and the SourceIP column to correlate the events by source. Target view The Event Analysis - Target view provides a good perspective for determining the hosts that are possible targets of suspicious activity. While these hosts may not be the ultimate target of an attack, they can be an early indicator of the attack s scope. What is the Target view? The Target view is a default analysis view that provides information about IP address and DNS names that may be the target of suspicious activity. The Target view provides event counts for the source hosts and tag names that are associated with the activity. It also provides severity counts and the date and time of the event. 46 SiteProtector System: Security Analysts' User Guide

53 Example of the Target view The following figure provides an example of the Target view: Guideline for viewing the Target view Use the following guideline when you are viewing events in the Target view: v External probes and scans If you are monitoring external events from agents that are located in your DMZ or outside your network (for example, a network appliance outside your external firewall), you may see hundreds of events from the automated probes and scans, many of which can be harmless. If you choose to monitor this activity, consider how you can effectively filter these events. See Section C: Filtering Activity from Analysis Views on page 49. Attacker view The Event Analysis - Attacker view provides a good starting point for determining the hosts from which suspicious traffic has originated. Use the Attacker view to correlate events with the source IP address. What is the Attacker view? The Attacker view is a default analysis view that provides information about the IP address and the DNS name that is the source of suspicious traffic. It also provides dates, event counts, and severity ratings. By default, the High, Medium, and Low columns are sorted by severity. Chapter 6. Detecting Suspicious Activity 47

54 Example of the Attacker view The following figure provides an example of the Attacker view: Guidelines for viewing events in the Attacker view Use the following guidelines when viewing events in the Attacker view: v Determine the organization that the IP address is registered to Knowing the company that owns the SourceIP listed in the SourceIP column can help narrow down the search for the attacker. Use the guided question What is the WhoIs record of this IP address? to determine the IP address that the SourceIP is registered to. Also consider other Internet sources of this information, such as RIPE, ARIN, and APNIC. v Consider the source The IP addresses listed in the SourceIP column of the Attacker view are not always the origin of suspicious traffic. This IP address may be registered to an Internet Service Provider or another institution, and the IP address sending the traffic may reside behind a firewall that uses network address translation (NAT). The IP address may be an internal host that has been hijacked by an attacker who is using this host to try to attack other internal hosts. Scenarios for using guided questions and Event Analysis views Guided questions and event analysis views can help you correlate the source of suspicious activity. Use this topic to help familiarize yourself with situations you may encounter. Reference: See the following topics for procedures on using guided questions and analysis views: v Selecting an Analysis view on page 7 v Selecting guided questions on page 12 Scenario 1 The following table describes a process in which an analyst discovers suspicious activity, and then accesses event analysis views for more specific information: Stage Description 1 While monitoring the Event Analysis - Event Name view, an analyst detects a sudden increase in events. The tag names do not seem to correlate with a specific category of signatures. 2 The analyst selects the event that is at the top of the list, and then selects What are the sources of this event? The Event Analysis - Attacker view appears and shows that a single IP address is the source of all the events associated with this tag name. 3 The analyst selects Which sensors detected this attacker? and the Event Analysis - Sensor view appears. The Sensor view shows that all the events coming from the attacker's IP address are detected by a network appliance located in the DMZ. No other agents in the network are reporting events from this attacker. 48 SiteProtector System: Security Analysts' User Guide

55 Stage Description 4 The analyst concludes that this attacker is starting a series of probes or scans that are targeted at the servers in the network's DMZ. The analyst creates an incident for this event and decides to manually correlate the remaining events. Section C: Filtering Activity from Analysis Views To successfully detect suspicious activity, you must eliminate normal activity from the analysis views. This section provides background information and procedures for filtering activity so that you can focus on what is important in your analysis. The importance of filtering Filtering is an important part of detecting suspicious activity. On any a given day, you may create dozens of filters. Typically, the filtering you perform at this stage is different from the more targeted filtering you perform when you investigate a confirmed attack or a compromised system. Creating baselines A baseline enables you to tell at a glance if the number of events in an analysis view has increased or if a new event has appeared. For example, if you notice that one IP address or tag name is associated with an unusually high increase in the number of events, you may want to investigate it further. Important: You can only set one baseline view at a time. Baseline data only appears for event counts. If event count columns do not appear in your view, then you will not see baseline data. Guidelines for creating baselines Because baselines exclude data from analysis, you should follow the guidelines for creating baselines: v Familiarize yourself with the traffic in your environment You must be familiar with the traffic in your network before a baseline can be effective. You must establish what is normal for your network, and then compare this state with the current state. This is an ongoing process and requires constant attention. v Understand how the change control process affects baselines Understand how changes that you are implementing in your network can affect baselines. For example, if you install software patches on a group of servers, this could significantly increase or decrease the number of events that you are seeing. Items changed in the analysis view When you create a baseline, the following items are changed in the analysis view: Item event counts status bar Description If an agent detects a new event, the increase is shown in red in the event count column that applies (source, target, tag, object). Example: 241 (+34). If the change is a decrease, the amount of decrease is shown in blue. The status bar displays the baseline icon when a baseline is enabled. Move the pointer over this icon to view the "Baseline [date and time]" information. Chapter 6. Detecting Suspicious Activity 49

56 Example of baseline view The following figure provides an example of a baseline created for a the Event Name view. Note that the event counts that show increases are in parentheses: Creating a baseline Use the Baseline function to analyze changes in the number of events relative to the events identified at the time of the baseline. Before you begin Baseline data appears only with event counts, therefore you must add the Event Count column to the Analysis view to see baseline data. About this task You can set only one baseline view at a time, and the view applies to the currently selected group. 1. Open an Analysis tab, and then select a group in the left pane. 2. If the Event Count column is not in the current view, either add it or select an Analysis View that includes it. 3. Click Action > Baseline > Establish. The Baseline icon appears in the status bar of the Console whenever the baseline is displayed. 4. If event counts change over time or if they change because of changes you make in the view, the Event Count column, and other applicable count columns, change as follows: If the event count... increases decreases Then the event count is displayed... in red, followed by the number of additional events inside parentheses. Example: 45(+4) in blue, followed by the number of fewer events inside parentheses. Example: 2(-2) Modifying the baseline Restore the baseline to return to your last baseline, or reset the baseline to use current values. 50 SiteProtector System: Security Analysts' User Guide

57 Before you begin Baseline data appears only with event counts, therefore you must add the Event Count column to the Analysis view to see baseline data. 1. Open an Analysis tab, and then select a group in the left pane. 2. If the Event Count column is not in the current view, either add it or select an Analysis View that includes it. 3. To the last baseline, click Action > Baseline > Restore. 4. To reset the baseline, do one of the following tasks: If you want to reset... the entire baseline selected rows Then... click Action > Baseline > Restore. select the rows to reset and click Action > Baseline > Reset Selected Values. Creating incidents and exceptions Incidents and exceptions are event filters that you can use to emphasize or exclude events that meet certain criteria. This topic provides guidelines and procedures for doing the following: v creating incidents and exceptions v editing incidents and exceptions v deleting incidents and exceptions Reference: v See Creating exceptions to filter scan activity on page 58 for information about how to use exceptions to exclude events generated by authorized vulnerability scans. When to use incidents and exceptions The following table describes when to use incidents and exceptions: If you want to... emphasize or track certain events in your analysis exclude certain events from your analysis Then create an... incident. exception. Information that you can include in an incident or exception The SiteProtector system automatically associates certain event details with an incident or an exception. If you create an incident or exception by first right-clicking an event or a group of events, the SiteProtector system populates the information in the fields in the New Incident/Exception window with the event details that apply. Guideline for creating incidents Use the following guideline for creating incidents: v Merge incidents with tickets when you confirm that certain activity is a threat If you determine that an incident should be formally investigated, consider merging the information from the incident into a ticket. Tickets allow you to categorize and track the activity and assign ownership using the SiteProtector system's incident tracking system. Chapter 6. Detecting Suspicious Activity 51

58 Guidelines for creating exceptions Use the following guidelines for creating exceptions: v Create exceptions for activity that fits a specific pattern Use exceptions to filter events that fit a specific pattern. Typically, an exception should require some future action to be performed by the person or organization responsible for it. v Configure the SecurityFusion Module to ignore events that are categorized as exceptions The SecurityFusion Module requires system resources when it analyzes traffic. Because exceptions are by definition not part of your analysis, configure the SecurityFusion Module to ignore events that are categorized as exceptions. v Do not create exceptions for events of undetermined importance You may be tempted to categorize events of undetermined importance as exceptions. If you do not know the importance of events you are monitoring, do not categorize these events but continue monitoring and manually correlating these events until you can make a determination. Defining incidents and exceptions Use the New Incident/Exception window to define the types of events and SecurityFusion module attack patterns that you want SiteProtector to handle as incidents or as exceptions. About this task Note: For incidents or for exceptions that involve SecurityFusion module attack patterns, you can modify only the values in the Name and Description fields. 1. Select an event in an Analysis tab, and then click Action > Incidents/Exceptions > New. 2. Select Incident or select Exception for the Category, and then complete the following fields as applicable: Field Ignore these events in SecurityFusion attack patterns Name (Optional) Description Time Source IP Description Whether to exclude the events you specify for this incident or exception from SecurityFusion module attack patterns A unique name to help you identify this incident or exception A brief description to help you remember the purpose of this incident or exception The Start and End times and dates for the period of time that you want this incident or exception to be in effect Tip: If you want to change the time and the date, change the time first. Note: Leave the End field empty if you want the incident or exception to remain in effect indefinitely. The range of source IP addresses for which you want the incident or exception to apply. If there is only one IP address, type it in both boxes. Note: You must specify either a source or a target IP address. Target IP Tag Name Object Name The range of target IP addresses for which you want the incident or exception to apply Note: You must specify either a source or a target IP address. The name by which the event to include in the incident or exception is known in the X-Force The types of objects such as File, Registry Key, or User Group to include in this incident or exception Tip: The complete list of objects is defined for Object Type in Advanced Filters. 52 SiteProtector System: Security Analysts' User Guide

59 Field Observance Type Description The types of observances such as Incomplete data, Intrusion detection, or vulnerability to include in this incident or exception Tip: The complete list of observances is defined in the Observance Type filter. 3. Click OK. Editing incidents and exceptions Use the Manage Incident/Exception window to edit an incident or exception. 1. Select Action > Incident/Exception > Manage. 2. In the Incidents/Exceptions area, select the check boxes for the types of incidents and exceptions you want to appear in the list, and then click Load. 3. Select the incident or exception you want to edit, and then click Edit. 4. Edit the following items as necessary: v Name v Description v Source IP Address v Target IP Address v Tag Name v Object Name v Observance Type Note: If you are editing an incident or exception involving attack patterns, you can modify the values only in the Name and Description boxes. 5. Click OK. Deleting incidents and exceptions Use the Manage Incident/Exception window to delete an incident or exception 1. Select Action > Incident/Exception > Manage. 2. In the Incidents/Exceptions area, select the check boxes for the types of incidents and exceptions you want to appear in the list, and then click Load. 3. In the Manage Incident/Exception window, select the incident or exception you want to delete, and then click Delete.. A confirmation window appears. 4. Click Yes to delete the incident or exception. 5. Click OK. Chapter 6. Detecting Suspicious Activity 53

60 54 SiteProtector System: Security Analysts' User Guide

61 Chapter 7. Is Suspicious Activity Significant? To detect suspicious activity efficiently, you must rule out activity that is not significant and do this early in the detection process. This approach helps you filter unimportant events and focus on attacks that are significant. This chapter primarily addresses ruling out suspicious activity that is caused by the following: v unauthorized activity that according to your security policy does not require an in-depth investigation or response v authorized or normal activity that appears suspicious but is actually harmless Quick reference for tasks covered in this chapter The following table provides a quick reference for tasks that are covered in this chapter. Use this table to help you choose the topic or topics that correspond to specific problems: If you... And... Then... know when authorized scans are scheduled to run do not know when authorized scans are scheduled to run but suspect that an Internet Scanner scan is running the SecurityFusion Module is not enabled the SecurityFusion Module is enabled the SecurityFusion Module is not enabled before the scan is scheduled to run, create an exception that filters the scan activity from the Console. See Creating exceptions to filter scan activity on page 58. view Internet Scanner incidents in the Event Analysis-Incidents view. See Filtering authorized scans using attack patterns on page 57. identify the authorized scan by analyzing the event details, and then create an exception that filters the activity from your Console. do not know when authorized scans are scheduled to run but you suspect that a third party scan is running suspect that activity is caused by a misconfigured system suspect that activity is caused by authorized activity that is commonly identified as suspicious See the following topics: v Identifying activity caused by vulnerability scans on page 56 v Creating exceptions to filter scan activity on page 58 identify the authorized scan by analyzing the event details, and then create an exception that filters the activity from your Console. See the following topics: v Identifying activity caused by vulnerability scans on page 56 v Creating exceptions to filter scan activity on page 58 see Identifying activity caused by misconfigured systems on page 58. See Identifying normal activity commonly identified as suspicious on page 59 Copyright IBM Corp. 1994,

62 Identifying the location of an attack Attack location is the first thing you should consider when you are determining the significance of an attack. Suspicious activity at your Internet firewall is less significant than an attacker who has gained access to your Accounting file server. This topic provides a procedure for identifying an attack location using the Event Analysis - Agent view. Significance of attack location The location of the sensor that detected the activity can tell you the general vicinity of an attack. Typically, suspicious activity that is detected outside your network is frequent enough that it cannot be monitored successfully. For example, events that are detected by agents located in your internal network may require more attention than events detected by agents located outside your firewall. Analyzing the Event Analysis - Agent view 1. Select Analysis from the Go to list. 2. Select the Event Analysis - Event Name view. 3. Right-click the event that you are investigating, and then select Which agents detected this event? from the menu. Note: This question is not limited to the Event Name view. This guided question is available in all the Event Analysis views except the Event Analysis - Agent view. 4. View the Agent IP and the DNS Name columns to determine where the agent is located in your network. Note: If the agent that detected this event is located outside your network, in your DMZ, or in a location that you have determined is not vulnerable, consider limiting the time and effort that is directed toward monitoring and tracking this activity. What to do next Reference: You can also use guided questions to inquire about vulnerability events. See Selecting guided questions on page 12. Identifying activity caused by vulnerability scans Important information about vulnerability scans that are running or scheduled to run on your network may not be communicated in a timely fashion to the departments that are affected. If you know or suspect that a vulnerability scan is running on your network, use the information in this topic to help you identify this activity. Importance of communication and planning Communication and planning are important in helping you avoid false alarms caused by unexpected vulnerability scans. Maintain close communication with the personnel that perform vulnerability scans on your network so that these scans do not come as a surprise to you. Unauthorized vulnerability scans Because vulnerability scans probe hosts similar to the way attackers do, you cannot always distinguish between authorized vulnerability scans and scans that are started by attackers. If you cannot confirm that a vulnerability scan is authorized, it is probably an attack. 56 SiteProtector System: Security Analysts' User Guide

63 Guidelines for identifying scans in the Console A vulnerability scan may be in progress if you observe one or more of the following: Note: Exercise caution when using these guidelines because the authorized scan activity is often very similar to attack activity. v an excessive number of events associated with a single source and a large number of target hosts v activity that progresses according to some logical internal pattern, such as functional areas or departments v activity that triggers a wide range of signatures in a short time period Filtering authorized scans using attack patterns Authorized vulnerability scans can generate a large volume of suspicious traffic within a short time period. Typically, this traffic is correctly identified as suspicious but is not an attack. This topic provides background information and guidelines for using Internet_Scanner_Scan attack patterns to identify authorized vulnerability scans. Important: The SecurityFusion Module must be enabled before you can use Internet_Scanner_Scan attack patterns. See Section E: SecurityFusion Module Impact Analysis on page 18 for more information. How does an Internet_Scanner_ Scan attack pattern work? The Internet_Scanner_Scan attack pattern identifies initiation of an IBM Internet Scanner scan from a host followed by other events triggered by the same source host against one or more targeted hosts. Appropriately configured agents and appliances can trigger this attack pattern when they are monitoring a network over which scanning is performed. By default, the Internet_Scanner_Scan attack pattern automatically creates an incident for the events that match this pattern and continues to filter the events accordingly. Example of Internet_Scanner_ Scan attack patterns The following figure shows two Internet_Scanner_Scan attack patterns in the Event Analysis - Incidents view. These incidents appear only when the SecurityFusion Module is enabled. Note the large event counts that are associated with a single source count (the scanning host) and two target counts (the hosts that are being scanned): Guidelines for using Internet_Scanner_ Scan attack patterns Use the following guidelines to analyze Internet_Scanner_Scan attack patterns: v Attackers use scanners to perform reconnaissance and even begin attacks, so verify that an unauthorized user is not using IBM Internet Scanner to perform these types of scans. v Because a one-to-one correspondence does not always exist between the scanning host and the target host, the SecurityFusion Module may create more than one incident for a single scan. Conversely, it may also create one incident for multiple scans. Important: If you think that the SecurityFusion Module is not pairing hosts correctly, you should manually correlate scanning hosts with target hosts. Chapter 7. Is Suspicious Activity Significant? 57

64 Creating exceptions to filter scan activity After you know that a vulnerability scan is running or is scheduled to run on your network, consider creating an exception to filter this traffic from the Console. Use the guidelines and the procedure in this topic to help you create exceptions for filtering scan activity. When to filter scans Consider creating exceptions for vulnerability scans in the following situations: v you or some one in your organization is using a third-party scanning tool (not IBM Internet Scanner) to scan your network v SecurityFusion Module is not enabled Important: Exceptions are not global; they apply only to the Console that creates the exception. Guidelines for creating exceptions Use the following guidelines to specify criteria for filtering scan activity: v Use criteria that is unique to the scan so that you do not filter activity that is not related to the scan. v When in doubt, narrow the scope of the activity you are filtering rather than expand it. v Limit the target addresses of the scan to IP addresses inside the internal network. Creating exceptions for filtering scans from the Console 1. Perform the procedure in Defining incidents and exceptions on page Use the following table to specify information in the New Incidents/Exceptions window: Field Start End Source IP Target IP Description Specify the time and date the scan is scheduled to begin. Specify the time and date the scan is scheduled to end. Specify the IP address of the scanning host. This is the host where the scanning agent is installed. Specify the range of IP addresses that the scanning is scheduled to scan. Note: You may not be required to specify a Target IP for this exception if you specified a scanning agent in the Source IP field. Identifying activity caused by misconfigured systems Misconfigured systems can cause malfunctions and introduce vulnerabilities that are sometimes hard to detect and remediate, and it is not always clear whether the misconfiguration is an honest mistake or malicious. You can use information about misconfigured systems to help troubleshoot problems in your network and identify possible vulnerabilities. Misconfigured systems Systems can be misconfigured accidently by employee misuse, or misconfigured due to poor design. Attackers can sometimes exploit misconfigured system to gain access. The following can cause misconfigurations in your network: v new or updated software or hardware v incompatible software or hardware 58 SiteProtector System: Security Analysts' User Guide

65 v systems that are accidently misconfigured by employees v backdoors created for legitimate maintenance reasons Note: If an attacker misconfigures a system to gain access or cause harm, this is considered an attack, not a misconfigured system, and should be investigated. Examples of events that are caused by misconfigured systems Misconfigured systems can trigger certain events if the corresponding signatures are enabled in your policies. Use the following examples to help you identify misconfigured systems: v Subnet masks Legitimate hosts can sometimes reside on IP addresses that are typically used for broadcast addresses or subnet masks, such as These hosts can sometimes trigger events that identify exploits that use broadcast addresses, such as denial of service attacks or Smurf attack. v SMB authentication and share events These events are caused by hosts that freely share data with other hosts or authenticate without requiring a password, or requiring a weak or easily guessable password. Although it is not a best practice, some administrators allow internal hosts to communicate this way. This activity can trigger events that detect host-to-host communication that is weak or out of compliance, such as the Smb_empty_password and Smb_guessable_password events. v Routing errors Administrators sometimes neglect to disable IP routing, which is enabled by default on hosts that run the Unix operating system. In most cases, these hosts are typically not configured properly and they can drop a significant number of packets. Identifying normal activity commonly identified as suspicious Agent and appliance policies contain hundreds of checks that identify everything from high to low severity activity. One of the biggest challenges in detecting suspicious activity is filtering normal activity that is identified as suspicious. This topic provides information that can help you filter this activity from the Console. Why is normal activity sometimes identified as suspicious? Normal activity is typically identified as suspicious if it exceeds certain predefined thresholds, if the protocol that the traffic uses is considered vulnerable, or if it triggers events that are primarily used for auditing purposes. While normal traffic is typically not malformed, it may be prohibited by your security policy or incompatible with the systems that are running in your network. Typically, normal traffic falls into the following categories: v audit events v false positives Events that are typically identified as suspicious The following table lists events that are typically identified as suspicious: Important: This information is subject to change. Events DHCP a Description The DHCP protocol dynamically assigns IP addresses to hosts on your network. If this protocol is enabled in your environment, this traffic is probably legitimate. Chapter 7. Is Suspicious Activity Significant? 59

66 Events ftp_* http_* Lanman_share_enum netbios_session* Nnntp_* Ospf_* Smb_* Snmp_community Snmp_activity Tcp_probe_xwindows Description Administrators use the FTP protocol to transfer files between network devices. This traffic is probably legitimate if it is allowed by your security policy. The HTTP protocol is found extensively in networks where Internet traffic is allowed. This is probably legitimate if it is allowed by your security policy. However, if you have certain subnets where Internet traffic is restricted, such engineering labs, you should monitor for HTTP traffic. This event identifies hosts that are trying to enumerate shares on a specified target. If your security policy allows enumeration between hosts in your network, this traffic is probably legitimate. NetBIOS allows applications on different computers to communicate within a local area network. This lower layer protocol is used by almost all devices that use the Windows operating system. NNNTP is a protocol that allows users to post, distribute, and read Usenet messages. This traffic is probably legitimate if it is allowed by your security policy. OSPF is a routing protocol that routers use to communicate with other routers. This traffic is probably legitimate if routers on your network are configured to use this protocol. SMB is a host-to-host communication protocol that allows hosts to access and share information with other hosts. While attackers can use this protocol for recommence, it is probably legitimate if it is allowed by your security policy. SNMP is a network management protocol that allows administrators to remotely monitor and troubleshoot network devices. This traffic is probably legitimate if it is allowed by your security policy. X Windows System is a graphical interface protocol that is installed with earlier versions of Windows that allows devices to communicate in distributed environments. This traffic is probably legitimate if it is allowed by your security policy. a. These events refer to all events in a particular category of signatures. 60 SiteProtector System: Security Analysts' User Guide

67 Chapter 8. Is an Attack a Threat? After you determine that suspicious activity is an attack, you should decide whether the activity is a threat to your network. This chapter provides information about using the SecurityFusion Module and other SiteProtector system tools to assess whether an attack is a threat. Combining the SecurityFusion Module and other SiteProtector system tools SecurityFusion Module information may not always be conclusive, although it can provide a significant amount of data about an attack. Consider combining SecurityFusion Module statuses with other information that is provided in the SiteProtector system analysis views. Section A: Using the SecurityFusion Module to Assess an Attack An event's SecurityFusion status is an important factor in determining whether an attack poses a significant threat. This is because it can provide information about several key areas of your investigation that you would otherwise have to gather manually. Impact analysis The SecurityFusion Module uses a process called impact analysis to determine whether an attack from a single event has succeeded. When an intrusion detection sensor detects an attack, the Module correlates the attack with information about the host such as operating system, vulnerabilities, and responses taken by host agents to determine the success or failure of the attack. The Module reports the result of impact analysis as a status that appears in the SiteProtector system. Topic Viewing attack statuses Viewing attack statuses Attack statuses can provide valuable information about an attack. This topic provides information about viewing attack statuses in the SiteProtector System. Agents and appliances that provide impact analysis Only certain agents can provide impact analysis information to the SiteProtector system. The following agents and appliances can be configured to provide attack statuses to the SiteProtector system: v Proventia Network Multi-Function Security (MFS) appliances v IBM Security Network Intrusion Prevention System (IPS) appliances v IBM Security Server Protection Attack statuses The status of a correlated event describes the impact of an attack or other security event. These statuses appear in the Analysis views when the Status, Reason, and Description columns are enabled. The SecurityFusion module derives the impact by correlating events with vulnerability assessment data and other host information about targeted hosts. The following table describes vulnerability statuses for intrusion detection events from highest to lowest priority: Copyright IBM Corp. 1994,

68 Status Reason Description Attack Successful Confirmed by agent The agent that detected the event determined that the attack was successful. File accessed The agent that detected the event determined that files on the target host were accessed. Successful attack likely Vulnerable A vulnerability assessment scan indicates that the host was vulnerable to this attack, so the attack was probably successful. Attack detected No correlation The impact of the event is unknown because no host data (vulnerability or operating system) corresponds to this event. These events could be audit events, such as "login successful," status events from sensors, or, in some cases, events that SecurityFusion does not correlate. SecurityFusion not configured for this host SecurityFusion not licensed Vuln not scanned recently The SecurityFusion module is not enabled for this Site or for this host. Neither the source nor the destination host is licensed for SecurityFusion correlation. For one of the following reasons, no vulnerability or other host data is available to determine the impact of the attack: v v v This status supersedes other potentially applicable statuses, such as no correlation or not scanned recently. The host has never been scanned. The scan data for the host has passed the user-defined expiration date. OS check indeterminate The impact of the attack is unknown because the vulnerability assessment scan could not determine the operating system of the target. Simulated block response not enabled The simulated block response was not configured on the agent that detected this attack. Block response not enabled The block response was not configured on the agent that detected this attack. 62 SiteProtector System: Security Analysts' User Guide

69 Status Reason Description Vulnerable Attack will be detected and prevented The scanning agent determined that the target host is vulnerable; however, the agent that is configured to monitor this traffic will block attacks that exploit this vulnerability. Attack will be detected and partly blocked Attack will be detected Attack will not be detected The scanning agent determined that the target host is vulnerable; however, the agent that is configured to monitor this traffic will partly block attacks that exploit this vulnerability. The scanning agent determined that the target host is vulnerable; however, the agent that is configured to monitor this traffic will detect attacks that exploit this vulnerability. The scanning agent determined that the target host is vulnerable; however, the agent that is configured to monitor this traffic will not detect attacks that exploit this vulnerability. Not Vulnerable Not applicable The agent determined that the host was not vulnerable to the attack. Vuln check indeterminate Not applicable The vulnerability status is unknown because the vulnerability assessment scan could not determine whether the target host is vulnerable. Failure possible Scanned, vuln not confirmed IBM Internet Scanner ran the correlating vulnerability check against the target, but the target did not confirm whether the vulnerability exists. Chapter 8. Is an Attack a Threat? 63

70 Status Reason Description Attack failure No vulnerability A vulnerability assessment scan indicates that the host was not vulnerable to this attack, so the attack probably failed. Rolled-back change A sensor detected an unauthorized change to a protected system object such as to a registry key or to a share and reverted the object to its prior state. Wrong OS The host is running an operating system that is not susceptible to this attack. Connection reset The agent or firewall reset the attacker's connection. Process terminated The target process or service was terminated. File not accessed The attacker was not able to access the file on the target host. Port not open The target ports were not open on the target host or firewall. Blocked at host The attack failed because the sensor or agent protecting the host blocked the attack. Dynamically blocked at host The attack failed because the agent protecting the host dynamically blocked the attack. Failed attack Blocked by Proventia or IBM Security appliance The attack failed because the appliance protecting the host in inline protection mode blocked the attack. Simulated block Attacker quarantined by Proventia or IBM Security appliance Proventia or IBM Security appliance in simulation mode Protection not enabled The attack failed because the appliance protecting the host quarantined the attack. An attack was not blocked by an appliance because the appliance was in simulation mode. The appliance would have blocked the attack if it had been in protection mode. An attack was not blocked by an appliance because protection was not enabled on the appliance. 64 SiteProtector System: Security Analysts' User Guide

71 Status Reason Description Not Compliant Application access blocked The agent determined that the host attempting to access the network was not compliant and the host was blocked from accessing applications. Corporate access blocked Network access blocked The agent determined that the host attempting to access the network was not compliant and the host was blocked from accessing the corporate network. The agent determined that the host attempting to access the network was not compliant and the host was blocked from accessing the network. Viewing the attack status for an event or group of events This topic describes how to view the attack status for an event or group of events. 1. Select Analysis from the Go to list. 2. Open an Event Analysis view that contains the Status column. 3. Display the events for a group of assets, and then do the following: To find... likely successful attacks possibly successful attacks Look for these statuses in the Status column: Success likely (target vulnerable) Unknown impact (SecurityFusion not licensed) Failure possible (scanned, vulnerability not confirmed) Unknown impact (no correlation) Unknown impact (OS check indeterminate) failed and likely failed attacks Failed attack (blocked at host) Failed attack (blocked by Proventia appliance) Failure likely (no vulnerability) Failure likely (rolled-back change) Failure likely (wrong OS) problems that prevent correlation Unknown impact (SecurityFusion not enabled) Unknown impact (not scanned recently) Section B: Assessing an Attack Manually If the SecurityFusion Module is not enabled or impact analysis data provided by the Module is inconclusive, you can use other analysis tools to assess an attack's threat level. Use this section to help you use other SiteProtector system analysis tools to determine whether an attack is a threat. Chapter 8. Is an Attack a Threat? 65

72 Determining the X-Force risk level of an attack The X-Force risk levels provide a quick way for you to determine the severity of an attack without analyzing the details of an event. Use the X-Force risk levels to help you determine whether an attack is a threat. How to view X-Force risk levels on the Console X-Force provides a severity level for each event that appears on the Console. The risk level (high, medium, or low) appears in the Severity column of the Analysis views, as follows: X-Force risk levels X-Force assigns risk levels to describe the extent of damage that can be caused by a security issue. The possible risk levels are as follows: Risk Level High Medium Low Description Security issues that allow immediate remote or local access, or immediate execution of code or commands, with unauthorized privileges. Examples are most buffer overflows, backdoors, default or no password, and bypassing security on firewalls or other network components. Security issues that have the potential of granting access or allowing code execution by means of complex or lengthy exploit procedures, or low risk issues applied to major Internet components. Examples are cross-site scripting, man-in-the-middle attacks, SQL injection, denial of service of major applications, and denial of service resulting in system information disclosure (such as core files). Security issues that deny service or provide non-system information that could be used to formulate structured attacks on a target, but not directly gain unauthorized access. Examples are brute force attacks, non-system information disclosure (configurations, paths, etc.), and denial of service attacks. Was the attack target vulnerable? If the target host is not vulnerable, then the attack is probably not a threat. Use the information in this topic to help you determine whether a target host is vulnerable. 66 SiteProtector System: Security Analysts' User Guide

73 Guidelines for determining whether a target is vulnerable Use the following guidelines to scan an attacked host: v If you know the specific exploit the attacker is using, and you can run this exploit, then run the exploit from the Console computer. v If you do not know the specific exploit the attacker is using, then scan the host using an IBM Internet Scanner or IBM Proventia Network Enterprise Scanner policy that has the following checks enabled: Windows: DCOM, LSASS, ASN, and null sessions Unix: default community string for router software, open nfs mounts, and common buffer overflows v If you know the specific exploit the attacker is using, then scan using an IBM Internet Scanner or Proventia Network Enterprise Scanner policy with only the check or checks that correspond to the exploit the attacker is using. v Search previous scan data of the target host in which an IBM Internet Scanner or Proventia Network Enterprise Scanner L5 policy was applied. Running scans against attack targets using IBM Internet Scanner Use the Remote Scan window to run a vulnerability scan against an attack target for specific exploits using IBM Internet Scanner. 1. Select Asset from the Go to list. 2. Right-click the asset, and then select Scan from the pop-up menu. The Remote Scan window appears. 3. Select Internet Scanner. 4. Select the scanner you want to use from the Agent Name list. 5. In the left pane, select the Scan Policy icon. 6. Do you know the exploit the attacker is using? v If yes, right-click a blank policy from the list in the right pane, select Derive from new from the pop-up menu, and then go to Step 7. v If no, select the IBM Internet Scanner policy that you want to use in the Policy box, and then go to Step Type the name of the new policy in the Derive New window. The policy you selected opens in the policy editor. 8. Select the check or checks that correspond to the exploit, and then save the policy. 9. Select the Scan Session icon in the left pane, and then select the session that you want to use with this scan from the list in the right pane. 10. Click OK. 11. When the scan is complete, right-click the host in the Asset view, and then select What are the known vulnerabilities from the menu. The vulnerabilities found on the host appear in the Vuln Analysis - Vuln Name view. Running an ad hoc assessment scan Use Proventia Network Enterprise Scanner to run an ad hoc assessment scan of an entire group of assets or of one or more selected assets. 1. In an Asset tab, do one of the following: v Select a group in the left pane. v Select one or more assets in the right pane. 2. Right-click the group or the assets to scan, and then select Scan. Chapter 8. Is an Attack a Threat? 67

74 Note: If given a choice of IBM Internet Scanner or Proventia Network Enterprise Scanner, select Enterprise Scanner. 3. Click the Adhoc Scan Control icon. 4. In the Ad Hoc Assessment section, select the Perform one-time discovery scan of this group check box. 5. Type a Job name to identify the job when it appears in the Command Jobs window. 6. If you want the scan to run only during your scheduled scanning windows, select the Run only during open discovery windows check box. 7. Click Assessment in the left pane. 8. Configure the policy the same way as you would configure the background Assessment policy. 9. Click OK. The ad hoc assessment scan appears in the Command Jobs window. Running an ad hoc discovery scan If you want to run a one-time scan that uses ranges of IP addresses to discover devices running on your network, you can configure an ad hoc discovery scan from the IBM Proventia Network Enterprise Scanner agent. 1. On the SiteProtector navigation pane, set up a tab with any view except for a Policy view. 2. Expand the Site to see the group you want to scan. 3. Right-click the group to scan; if given a choice of IBM Internet Scanner or IBM Proventia Network Enterprise Scanner, select Enterprise Scanner; and then select Scan from the pop-up menu. 4. In the Ad Hoc Discovery section, select the Perform one-time discovery scan of this group check box. 5. Type a Job name to identify the job when it appears in the Command Jobs window. 6. If you want the scan to run only during your scheduled scanning windows, select the Run only during open discovery windows. 7. Click Discovery in the left pane. 8. Type the range, or ranges, of IP addresses to scan in the IP range(s) to scan box. 9. Type the IP addresses (in dotted-decimal or CIDR notation) of the assets to exclude in the IP range(s) to scan box as follows: v Type an IP address, and then press ENTER. v Type a range of IP addresses, and then press ENTER. Example: v Type a series of individual IP addresses and/or ranges of addresses separated by commas. Note: A red box appears around the IP range(s) to scan box until the data is validated. 10. If you want to add newly discovered assets to the group where you have defined the scan rather than to the Ungrouped Assets group, select the Add newly discovered assets to group check box. 11. If you want to add previously known assets (that are not in the group) to the group, select the Add previously known assets to group check box. 12. Click OK. The ad hoc discovery scan appears in the Command Jobs window. Was the target service or operating system susceptible? Even if unauthorized activity is malicious, the target operating system that it is trying to exploit may not be susceptible. Use the information in this topic to help you view security information about the exploit and the targeted asset so that you can determine whether the asset is susceptible. 68 SiteProtector System: Security Analysts' User Guide

75 Task overview This topic contains the following tasks: Task Description 1 Access security information about an event. 2 Determine the operating system running on the target host. 3 Determine the services targeted by the attack Information about a service or operating system The completeness of vulnerability data can determine how accurate and detailed information about a target is. For example, detailed information about services running on a host or operating system version may not be available if the target has not been scanned using a policy that checks for this information. Note: If the target host has not been scanned recently, consider running an ad hoc scan against the target. See Was the attack target vulnerable? on page 66. Operating system susceptibility The following figure shows security information for the Sun RPC rwall message overflow. Note that Unix is the only operating system listed under Systems affected. A Windows host is not susceptible to being attacked by this exploit: Chapter 8. Is an Attack a Threat? 69

76 Service susceptibility The following figure shows security information for the PeopleSoft Iclient servlet. Note that PeopleSoft is the only service that is affected by this exploit: 70 SiteProtector System: Security Analysts' User Guide

77 Accessing security information about an event In the Event Analysis view, right-click an event, and then select Open Event Details from the pop-up menu. Security information about the event you selected appears in the right pane. Chapter 8. Is an Attack a Threat? 71

IBM Proventia Management SiteProtector Policies and Responses Configuration Guide

IBM Proventia Management SiteProtector Policies and Responses Configuration Guide IBM Internet Security Systems IBM Proventia Management SiteProtector Policies and Responses Configuration Guide Version2.0,ServicePack8.1 Note Before using this information and the product it supports,

More information

IBM Proventia Management SiteProtector Installation Guide

IBM Proventia Management SiteProtector Installation Guide IBM Internet Security Systems IBM Proventia Management SiteProtector Installation Guide Version2.0,ServicePack8.1 Note Before using this information and the product it supports, read the information in

More information

ForeScout Extended Module for Qualys VM

ForeScout Extended Module for Qualys VM ForeScout Extended Module for Qualys VM Version 1.2.1 Table of Contents About the Qualys VM Integration... 3 Additional Qualys VM Documentation... 3 About This Module... 3 Components... 4 Considerations...

More information

ForeScout Extended Module for Tenable Vulnerability Management

ForeScout Extended Module for Tenable Vulnerability Management ForeScout Extended Module for Tenable Vulnerability Management Version 2.7.1 Table of Contents About Tenable Vulnerability Management Module... 4 Compatible Tenable Vulnerability Products... 4 About Support

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

IBM Global Technology Services May IBM Internet Security Systems Proventia Management SiteProtector system version 2.0, SP 7.

IBM Global Technology Services May IBM Internet Security Systems Proventia Management SiteProtector system version 2.0, SP 7. IBM Global Technology Services May 2008 IBM Internet Security Systems Proventia Management SiteProtector system version 2.0, SP 7.0 Preview Guide Page 1 Executive Summary IBM Internet Security Systems

More information

IBM Internet Security Systems Proventia Management SiteProtector

IBM Internet Security Systems Proventia Management SiteProtector Supporting compliance and mitigating risk through centralized management of enterprise security devices IBM Internet Security Systems Proventia Management SiteProtector Highlights Reduces the costs and

More information

Extended Search Administration

Extended Search Administration IBM Lotus Extended Search Extended Search Administration Version 4 Release 0.1 SC27-1404-02 IBM Lotus Extended Search Extended Search Administration Version 4 Release 0.1 SC27-1404-02 Note! Before using

More information

CounterACT Check Point Threat Prevention Module

CounterACT Check Point Threat Prevention Module CounterACT Check Point Threat Prevention Module Version 1.0.0 Table of Contents About the Check Point Threat Prevention Integration... 4 Use Cases... 4 Additional Check Point Threat Prevention Documentation...

More information

IBM Proventia Management SiteProtector Sample Reports

IBM Proventia Management SiteProtector Sample Reports IBM Proventia Management SiteProtector Page Contents IBM Proventia Management SiteProtector Reporting Functionality Sample Report Index 2-25 Reports 26 Available SiteProtector Reports IBM Proventia Management

More information

IBM Security SiteProtector System SP3001 Hardware Configuration Guide

IBM Security SiteProtector System SP3001 Hardware Configuration Guide IBM Security IBM Security SiteProtector System SP3001 Hardware Configuration Guide Version 2.9 Copyright statement Copyright IBM Corporation 1994, 2011. U.S. Government Users Restricted Rights Use, duplication

More information

ForeScout Extended Module for Advanced Compliance

ForeScout Extended Module for Advanced Compliance ForeScout Extended Module for Advanced Compliance Version 1.2 Table of Contents About Advanced Compliance Integration... 4 Use Cases... 4 Additional Documentation... 6 About This Module... 6 About Support

More information

IBM Security SiteProtector System Configuring Firewalls for SiteProtector Traffic

IBM Security SiteProtector System Configuring Firewalls for SiteProtector Traffic IBM Security IBM Security SiteProtector System Configuring Firewalls for SiteProtector Traffic Version 2.9 Note Before using this information and the product it supports, read the information in Notices

More information

IBM Security QRadar SIEM Version Getting Started Guide

IBM Security QRadar SIEM Version Getting Started Guide IBM Security QRadar SIEM Version 7.2.0 Getting Started Guide Note: Before using this information and the product that it supports, read the information in Notices and Trademarks on page 35. Copyright IBM

More information

IBM Security SiteProtector System SecureSync Guide

IBM Security SiteProtector System SecureSync Guide IBM Security IBM Security SiteProtector System SecureSync Guide Version 3.0 Note Before using this information and the product it supports, read the information in Notices on page 45. This edition applies

More information

C Number: C Passing Score: 800 Time Limit: 120 min File Version: 5.0. IBM C Questions & Answers

C Number: C Passing Score: 800 Time Limit: 120 min File Version: 5.0. IBM C Questions & Answers C2150-200 Number: C2150-200 Passing Score: 800 Time Limit: 120 min File Version: 5.0 http://www.gratisexam.com/ IBM C2150-200 Questions & Answers IBM Security Systems SiteProtector V3.0 - Implementation

More information

BackupVault Desktop & Laptop Edition. USER MANUAL For Microsoft Windows

BackupVault Desktop & Laptop Edition. USER MANUAL For Microsoft Windows BackupVault Desktop & Laptop Edition USER MANUAL For Microsoft Windows Copyright Notice & Proprietary Information Blueraq Networks Ltd, 2017. All rights reserved. Trademarks - Microsoft, Windows, Microsoft

More information

ForeScout Extended Module for ServiceNow

ForeScout Extended Module for ServiceNow ForeScout Extended Module for ServiceNow Version 1.2 Table of Contents About ServiceNow Integration... 4 Use Cases... 4 Asset Identification... 4 Asset Inventory True-up... 5 Additional ServiceNow Documentation...

More information

ForeScout Extended Module for Palo Alto Networks Next Generation Firewall

ForeScout Extended Module for Palo Alto Networks Next Generation Firewall ForeScout Extended Module for Palo Alto Networks Next Generation Firewall Version 1.2 Table of Contents About the Palo Alto Networks Next-Generation Firewall Integration... 4 Use Cases... 4 Roll-out Dynamic

More information

Desktop & Laptop Edition

Desktop & Laptop Edition Desktop & Laptop Edition USER MANUAL For Mac OS X Copyright Notice & Proprietary Information Redstor Limited, 2016. All rights reserved. Trademarks - Mac, Leopard, Snow Leopard, Lion and Mountain Lion

More information

ForeScout CounterACT. Assessment Engine. Configuration Guide. Version 1.0

ForeScout CounterACT. Assessment Engine. Configuration Guide. Version 1.0 ForeScout CounterACT Core Extensions Module: IoT Posture Assessment Engine Version 1.0 Table of Contents About the IoT Posture Assessment Engine... 3 View All Endpoints Having a Security Risk... 3 Assess

More information

ForeScout Extended Module for Bromium Secure Platform

ForeScout Extended Module for Bromium Secure Platform ForeScout Extended Module for Bromium Secure Platform Version 1.3.0 Table of Contents About the Bromium Integration... 3 Additional Bromium Secure Platform Documentation... 3 About This Module... 3 How

More information

Forescout. eyeextend for Palo Alto Networks Wildfire. Configuration Guide. Version 2.2

Forescout. eyeextend for Palo Alto Networks Wildfire. Configuration Guide. Version 2.2 Forescout Version 2.2 Contact Information Forescout Technologies, Inc. 190 West Tasman Drive San Jose, CA 95134 USA https://www.forescout.com/support/ Toll-Free (US): 1.866.377.8771 Tel (Intl): 1.408.213.3191

More information

ForeScout Extended Module for ServiceNow

ForeScout Extended Module for ServiceNow ForeScout Extended Module for ServiceNow Version 1.1.0 Table of Contents About this Integration... 4 Use Cases... 4 Asset Identification... 4 Asset Inventory True-up... 5 Additional ServiceNow Documentation...

More information

Centerity Monitor User Guide

Centerity Monitor User Guide Centerity Monitor 4.10 User Guide July 2018 Page 2 End-User License Agreement (EULA) This guide and the use of Centerity software is subject to Centerity s End-User License Agreement (EULA). A copy of

More information

Comodo cwatch Network Software Version 2.23

Comodo cwatch Network Software Version 2.23 rat Comodo cwatch Network Software Version 2.23 Administrator Guide Guide Version 2.23.060618 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1 Introduction to Comodo cwatch

More information

Server Edition USER MANUAL. For Mac OS X

Server Edition USER MANUAL. For Mac OS X Server Edition USER MANUAL For Mac OS X Copyright Notice & Proprietary Information Redstor Limited, 2016. All rights reserved. Trademarks - Mac, Leopard, Snow Leopard, Lion and Mountain Lion are registered

More information

The following topics describe how to work with reports in the Firepower System:

The following topics describe how to work with reports in the Firepower System: The following topics describe how to work with reports in the Firepower System: Introduction to Reports Introduction to Reports, on page 1 Risk Reports, on page 1 Standard Reports, on page 2 About Working

More information

ForeScout CounterACT. Configuration Guide. Version 1.2

ForeScout CounterACT. Configuration Guide. Version 1.2 ForeScout CounterACT Core Extensions Module: NetFlow Plugin Version 1.2 Table of Contents About NetFlow Integration... 3 How it Works... 3 Supported NetFlow Versions... 3 What to Do... 3 Requirements...

More information

Working with Reports

Working with Reports The following topics describe how to work with reports in the Firepower System: Introduction to Reports, page 1 Risk Reports, page 1 Standard Reports, page 2 About Working with Generated Reports, page

More information

ForeScout CounterACT. Configuration Guide. Version 3.4

ForeScout CounterACT. Configuration Guide. Version 3.4 ForeScout CounterACT Open Integration Module: Data Exchange Version 3.4 Table of Contents About the Data Exchange Module... 4 About Support for Dual Stack Environments... 4 Requirements... 4 CounterACT

More information

rat Comodo EDR Software Version 1.7 Administrator Guide Guide Version Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013

rat Comodo EDR Software Version 1.7 Administrator Guide Guide Version Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 rat Comodo EDR Software Version 1.7 Administrator Guide Guide Version 1.1.120318 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1 Introduction to Comodo EDR...3 1.1 Purchase

More information

ForeScout Open Integration Module: Data Exchange Plugin

ForeScout Open Integration Module: Data Exchange Plugin ForeScout Open Integration Module: Data Exchange Plugin Version 3.2.0 Table of Contents About the Data Exchange Plugin... 4 Requirements... 4 CounterACT Software Requirements... 4 Connectivity Requirements...

More information

ForeScout Extended Module for Carbon Black

ForeScout Extended Module for Carbon Black ForeScout Extended Module for Carbon Black Version 1.0 Table of Contents About the Carbon Black Integration... 4 Advanced Threat Detection with the IOC Scanner Plugin... 4 Use Cases... 5 Carbon Black Agent

More information

Workflows. Overview: Workflows

Workflows. Overview: Workflows The following topics describe how to use workflows: Overview:, on page 1 Predefined, on page 1 Custom Table, on page 11 Using, on page 11 Bookmarks, on page 39 Overview: A workflow is a tailored series

More information

Workflows. Overview: Workflows. The following topics describe how to use workflows:

Workflows. Overview: Workflows. The following topics describe how to use workflows: The following topics describe how to use workflows: Overview:, page 1 Predefined, page 2 Custom Table, page 10 Using, page 11 Bookmarks, page 38 Overview: A workflow is a tailored series of data pages

More information

Detector Service Delivery System (SDS) Version 3.0

Detector Service Delivery System (SDS) Version 3.0 Detector Service Delivery System (SDS) Version 3.0 Detecting and Responding to IT Security Policy Violations Quick Start Guide 2018 RapidFire Tools, Inc. All rights reserved. V20180112 Contents Overview

More information

ForeScout Extended Module for ArcSight

ForeScout Extended Module for ArcSight Version 2.8 Table of Contents About the ArcSight Integration... 4 Use Cases... 4 Send Endpoint Status, Compliance, or Property Changes from CounterACT to ArcSight... 5 SmartConnector Health and Compliance

More information

IBM emessage Version 9 Release 1 February 13, User's Guide

IBM emessage Version 9 Release 1 February 13, User's Guide IBM emessage Version 9 Release 1 February 13, 2015 User's Guide Note Before using this information and the product it supports, read the information in Notices on page 471. This edition applies to version

More information

ForeScout Extended Module for HPE ArcSight

ForeScout Extended Module for HPE ArcSight ForeScout Extended Module for HPE ArcSight Version 2.7.1 Table of Contents About the HPE ArcSight Integration... 4 Use Cases... 4 Send Endpoint Status, Compliance, or Property Changes from CounterACT to

More information

IBM TRIRIGA Application Platform Version 3.2. Graphics User Guide. Copyright IBM Corp i

IBM TRIRIGA Application Platform Version 3.2. Graphics User Guide. Copyright IBM Corp i IBM TRIRIGA Application Platform Version 3.2 Graphics User Guide Copyright IBM Corp. 2011 i Note Before using this information and the product it supports, read the information in Notices on page 31. This

More information

Configuring Firewalls for SiteProtector Traffic

Configuring Firewalls for SiteProtector Traffic IBM Proventia Management SiteProtector System Configuring Firewalls for SiteProtector Traffic Version 2.0, Service Pack 7, July 29, 2008 Overview SiteProtector cannot function properly if firewalls prevent

More information

Workflows. Overview: Workflows

Workflows. Overview: Workflows The following topics describe how to use workflows: Overview:, on page 1 Predefined, on page 1 Custom Table, on page 11 Using, on page 11 Bookmarks, on page 38 Overview: A workflow is a tailored series

More information

Pure Storage FlashArray Management Pack for VMware vrealize Operations Manager User Guide. (Version with Purity 4.9.

Pure Storage FlashArray Management Pack for VMware vrealize Operations Manager User Guide. (Version with Purity 4.9. Pure Storage FlashArray Management Pack for VMware vrealize Operations Manager User Guide (Version 1.0.139 with Purity 4.9.x or higher) Sunday, November 27, 2016 16:13 Pure Storage FlashArray Management

More information

Server Edition USER MANUAL. For Microsoft Windows

Server Edition USER MANUAL. For Microsoft Windows Server Edition USER MANUAL For Microsoft Windows Copyright Notice & Proprietary Information Redstor Limited, 2016. All rights reserved. Trademarks - Microsoft, Windows, Microsoft Windows, Microsoft Windows

More information

ForeScout Extended Module for IBM BigFix

ForeScout Extended Module for IBM BigFix ForeScout Extended Module for IBM BigFix Version 1.0.0 Table of Contents About this Integration... 4 Use Cases... 4 Additional BigFix Documentation... 4 About this Module... 4 Concepts, Components, Considerations...

More information

Sophos Enterprise Console Help. Product version: 5.3

Sophos Enterprise Console Help. Product version: 5.3 Sophos Enterprise Console Help Product version: 5.3 Document date: September 2015 Contents 1 About Sophos Enterprise Console 5.3...6 2 Guide to the Enterprise Console interface...7 2.1 User interface layout...7

More information

Server Edition. V8 Peregrine User Manual. for Microsoft Windows

Server Edition. V8 Peregrine User Manual. for Microsoft Windows Server Edition V8 Peregrine User Manual for Microsoft Windows Copyright Notice and Proprietary Information All rights reserved. Attix5, 2015 Trademarks - Microsoft, Windows, Microsoft Windows, Microsoft

More information

ForeScout CounterACT. Configuration Guide. Version 5.0

ForeScout CounterACT. Configuration Guide. Version 5.0 ForeScout CounterACT Core Extensions Module: Reports Plugin Version 5.0 Table of Contents About the Reports Plugin... 3 Requirements... 3 Supported Browsers... 3 Verify That the Plugin Is Running... 5

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

Table Of Contents INTRODUCTION... 6 USER GUIDE Software Installation Installing MSI-based Applications for Users...9

Table Of Contents INTRODUCTION... 6 USER GUIDE Software Installation Installing MSI-based Applications for Users...9 Table Of Contents INTRODUCTION... 6 USER GUIDE... 8 Software Installation... 8 Installing MSI-based Applications for Users...9 Installing EXE-based Applications for Users...10 Installing MSI-based Applications

More information

ForeScout Extended Module for MaaS360

ForeScout Extended Module for MaaS360 Version 1.8 Table of Contents About MaaS360 Integration... 4 Additional ForeScout MDM Documentation... 4 About this Module... 4 How it Works... 5 Continuous Query Refresh... 5 Offsite Device Management...

More information

Veritas System Recovery 18 Management Solution Administrator's Guide

Veritas System Recovery 18 Management Solution Administrator's Guide Veritas System Recovery 18 Management Solution Administrator's Guide Documentation version: 18 Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are

More information

ForeScout Extended Module for Symantec Endpoint Protection

ForeScout Extended Module for Symantec Endpoint Protection ForeScout Extended Module for Symantec Endpoint Protection Version 1.0.0 Table of Contents About the Symantec Endpoint Protection Integration... 4 Use Cases... 4 Additional Symantec Endpoint Protection

More information

Central Administration Console Installation and User's Guide

Central Administration Console Installation and User's Guide IBM Tivoli Storage Manager FastBack for Workstations Version 7.1 Central Administration Console Installation and User's Guide SC27-2808-03 IBM Tivoli Storage Manager FastBack for Workstations Version

More information

Administration Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit

Administration Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Deploy is a trademark owned by Specops Software. All

More information

Forescout. Configuration Guide. Version 2.4

Forescout. Configuration Guide. Version 2.4 Forescout Version 2.4 Contact Information Forescout Technologies, Inc. 190 West Tasman Drive San Jose, CA 95134 USA https://www.forescout.com/support/ Toll-Free (US): 1.866.377.8771 Tel (Intl): 1.408.213.3191

More information

ForeScout Extended Module for IBM BigFix

ForeScout Extended Module for IBM BigFix Version 1.1 Table of Contents About BigFix Integration... 4 Use Cases... 4 Additional BigFix Documentation... 4 About this Module... 4 About Support for Dual Stack Environments... 5 Concepts, Components,

More information

ForeScout Extended Module for Splunk

ForeScout Extended Module for Splunk ForeScout Extended Module for Splunk Version 2.7.0 Table of Contents About Splunk Integration... 5 Support for Splunk Enterprise and Splunk Enterprise Security... 7 What's New... 7 Support for Splunk Cloud...

More information

Central Administration Console Installation and User's Guide

Central Administration Console Installation and User's Guide IBM Tivoli Storage Manager FastBack for Workstations Version 7.1.1 Central Administration Console Installation and User's Guide SC27-2808-04 IBM Tivoli Storage Manager FastBack for Workstations Version

More information

ZENworks Reporting System Reference. January 2017

ZENworks Reporting System Reference. January 2017 ZENworks Reporting System Reference January 2017 Legal Notices For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government rights, patent

More information

ForeScout Extended Module for MobileIron

ForeScout Extended Module for MobileIron Version 1.8 Table of Contents About MobileIron Integration... 4 Additional MobileIron Documentation... 4 About this Module... 4 How it Works... 5 Continuous Query Refresh... 5 Offsite Device Management...

More information

Tenable.io User Guide. Last Revised: November 03, 2017

Tenable.io User Guide. Last Revised: November 03, 2017 Tenable.io User Guide Last Revised: November 03, 2017 Table of Contents Tenable.io User Guide 1 Getting Started with Tenable.io 10 Tenable.io Workflow 12 System Requirements 15 Scanners and Agents 16 Link

More information

Forescout. eyeextend for ServiceNow. Configuration Guide. Version 2.0

Forescout. eyeextend for ServiceNow. Configuration Guide. Version 2.0 Forescout Version 2.0 Contact Information Forescout Technologies, Inc. 190 West Tasman Drive San Jose, CA 95134 USA https://www.forescout.com/support/ Toll-Free (US): 1.866.377.8771 Tel (Intl): 1.408.213.3191

More information

ForeScout Extended Module for Splunk

ForeScout Extended Module for Splunk Version 2.8 Table of Contents About Splunk Integration... 5 Support for Splunk Enterprise and Splunk Enterprise Security... 6 What's New... 6 Support for Splunk Cloud... 6 Support for Batch Messaging...

More information

ForeScout CounterACT. Configuration Guide. Version 1.1

ForeScout CounterACT. Configuration Guide. Version 1.1 ForeScout CounterACT Hybrid Cloud Module: VMware NSX Plugin Version 1.1 Table of Contents About VMware NSX Integration... 3 Use Cases... 3 Additional VMware Documentation... 3 About this Plugin... 3 Dependency

More information

HPE Intelligent Management Center

HPE Intelligent Management Center HPE Intelligent Management Center Service Health Manager Administrator Guide Abstract This guide provides introductory, configuration, and usage information for Service Health Manager (SHM). It is for

More information

vrealize Hyperic Monitoring and Management Guide vrealize Hyperic 5.8.4

vrealize Hyperic Monitoring and Management Guide vrealize Hyperic 5.8.4 vrealize Hyperic Monitoring and Management Guide vrealize Hyperic 5.8.4 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments

More information

Forescout. eyeextend for IBM BigFix. Configuration Guide. Version 1.2

Forescout. eyeextend for IBM BigFix. Configuration Guide. Version 1.2 Forescout Version 1.2 Contact Information Forescout Technologies, Inc. 190 West Tasman Drive San Jose, CA 95134 USA https://www.forescout.com/support/ Toll-Free (US): 1.866.377.8771 Tel (Intl): 1.408.213.3191

More information

ForeScout CounterACT. Controller Plugin. Configuration Guide. Version 1.0

ForeScout CounterACT. Controller Plugin. Configuration Guide. Version 1.0 ForeScout CounterACT Network Module: Centralized Network Controller Plugin Version 1.0 Table of Contents About the Centralized Network Controller Integration... 4 About This Plugin... 4 How It Works...

More information

KYOCERA Net Viewer User Guide

KYOCERA Net Viewer User Guide KYOCERA Net Viewer User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable

More information

vcenter Hyperic Monitoring and Management Guide

vcenter Hyperic Monitoring and Management Guide vcenter Hyperic Monitoring and Management Guide vcenter Hyperic 5.8 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

SAS Infrastructure for Risk Management 3.4: User s Guide

SAS Infrastructure for Risk Management 3.4: User s Guide SAS Infrastructure for Risk Management 3.4: User s Guide SAS Documentation March 2, 2018 The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2017. SAS Infrastructure for

More information

Working with Reports. User Roles Required to Manage Reports CHAPTER

Working with Reports. User Roles Required to Manage Reports CHAPTER CHAPTER 10 Cisco Prime Network (Prime Network) provides a Report Manager that enables you to schedule, generate, view, and export reports of the information managed by Prime Network. You can save the generated

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

IBM TRIRIGA Application Platform Version 3.3. Graphics User Guide. Copyright IBM Corp i

IBM TRIRIGA Application Platform Version 3.3. Graphics User Guide. Copyright IBM Corp i IBM TRIRIGA Application Platform Version 3.3 Graphics User Guide Copyright IBM Corp. 2011 i Note Before using this information and the product it supports, read the information in Notices on page 33. This

More information

User Guide. Version R95. English

User Guide. Version R95. English Monitor User Guide Version R95 English July 20, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated

More information

IPS Event Analysis R Administration Guide

IPS Event Analysis R Administration Guide IPS Event Analysis R70.20 Administration Guide 21 December, 2009 More Information The latest version of this document is at: http://supportcontent.checkpoint.com/documentation_download?id=10506 For additional

More information

Agent and Agent Browser. Updated Friday, January 26, Autotask Corporation

Agent and Agent Browser. Updated Friday, January 26, Autotask Corporation Agent and Agent Browser Updated Friday, January 26, 2018 2018 Autotask Corporation Table of Contents Table of Contents 2 The AEM Agent and Agent Browser 3 AEM Agent 5 Privacy Mode 9 Agent Browser 11 Agent

More information

Using the VMware vcenter Orchestrator Client. vrealize Orchestrator 5.5.1

Using the VMware vcenter Orchestrator Client. vrealize Orchestrator 5.5.1 Using the VMware vcenter Orchestrator Client vrealize Orchestrator 5.5.1 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments

More information

Sophos Enterprise Console help. Product version: 5.5

Sophos Enterprise Console help. Product version: 5.5 Sophos Enterprise Console help Product version: 5.5 Contents 1 About Sophos Enterprise Console...6 2 Guide to the Enterprise Console interface...7 2.1 User interface layout...7 2.2 Toolbar buttons...7

More information

CounterACT Afaria MDM Plugin

CounterACT Afaria MDM Plugin Version 1.7.0 and Above Table of Contents About Afaria MDM Service Integration... 4 About This Plugin... 4 How It Works... 5 Continuous Query Refresh... 5 Offsite Device Management... 6 Supported Devices...

More information

Server Edition. V8 Peregrine User Manual. for Linux and Unix operating systems

Server Edition. V8 Peregrine User Manual. for Linux and Unix operating systems Server Edition V8 Peregrine User Manual for Linux and Unix operating systems Copyright Notice and Proprietary Information All rights reserved. Attix5, 2015 Trademarks - Red Hat is a registered trademark

More information

HPE Project and Portfolio Management Center

HPE Project and Portfolio Management Center HPE Project and Portfolio Management Center Software Version: 9.41 Getting Started Go to HELP CENTER ONLINE http://ppm-help.saas.hpe.com Document Release Date: March 2017 Software Release Date: March 2017

More information

IBM Endpoint Manager Version 9.0. Software Distribution User's Guide

IBM Endpoint Manager Version 9.0. Software Distribution User's Guide IBM Endpoint Manager Version 9.0 Software Distribution User's Guide IBM Endpoint Manager Version 9.0 Software Distribution User's Guide Note Before using this information and the product it supports,

More information

Sophos Enterprise Console

Sophos Enterprise Console Sophos Enterprise Console Help Product Version: 5.5 Contents About Sophos Enterprise Console...1 Guide to the Enterprise Console interface... 2 User interface layout... 2 Toolbar buttons...2 Dashboard

More information

The following topics describe how to use dashboards in the Firepower System:

The following topics describe how to use dashboards in the Firepower System: The following topics describe how to use dashboards in the Firepower System: About, page 1 Firepower System Dashboard Widgets, page 2 Managing, page 14 About Firepower System dashboards provide you with

More information

Hedgehog. User's Guide. January Release 3.5

Hedgehog. User's Guide. January Release 3.5 Hedgehog User's Guide Release 3.5 January 2010 www.sentrigo.com Copyright 2009 - All Rights Reserved. Hedgehog is a trademark of Sentrigo, Ltd. This material is proprietary of Sentrigo Ltd. Any unauthorized

More information

Device Management Basics

Device Management Basics The following topics describe how to manage devices in the Firepower System: The Device Management Page, on page 1 Remote Management Configuration, on page 2 Adding Devices to the Firepower Management

More information

BMC Remedy Action Request System Using a BIRT Editor to Create or Modify Web Reports

BMC Remedy Action Request System Using a BIRT Editor to Create or Modify Web Reports White Paper BMC Remedy Action Request System 7.6.04 Using a BIRT Editor to Create or Modify Web Reports September 2012 www.bmc.com Contacting BMC Software You can access the BMC Software website at http://www.bmc.com.

More information

Comodo Next Generation Security Information and Event Management Software Version 1.4

Comodo Next Generation Security Information and Event Management Software Version 1.4 rat Comodo Next Generation Security Information and Event Management Software Version 1.4 Administrator Guide Guide Version 1.4.101915 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table

More information

NETWORK PRINT MONITOR User Guide

NETWORK PRINT MONITOR User Guide NETWORK PRINT MONITOR User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change for improvement without notice. We

More information

VARONIS DATALERT APP FOR IBM QRADAR

VARONIS DATALERT APP FOR IBM QRADAR VARONIS DATALERT APP FOR IBM QRADAR Integration Guide Publishing Information Software version 0 Document version 1 Publication date October 9, 2018 Copyright 2005-2018 Varonis Systems Inc. All rights reserved.

More information

The Privileged Appliance and Modules (TPAM) 1.0. Diagnostics and Troubleshooting Guide

The Privileged Appliance and Modules (TPAM) 1.0. Diagnostics and Troubleshooting Guide The Privileged Appliance and Modules (TPAM) 1.0 Guide Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in

More information

Query Studio Training Guide Cognos 8 February 2010 DRAFT. Arkansas Public School Computer Network 101 East Capitol, Suite 101 Little Rock, AR 72201

Query Studio Training Guide Cognos 8 February 2010 DRAFT. Arkansas Public School Computer Network 101 East Capitol, Suite 101 Little Rock, AR 72201 Query Studio Training Guide Cognos 8 February 2010 DRAFT Arkansas Public School Computer Network 101 East Capitol, Suite 101 Little Rock, AR 72201 2 Table of Contents Accessing Cognos Query Studio... 5

More information

vcenter Server Appliance Configuration Update 1 Modified on 04 OCT 2017 VMware vsphere 6.5 VMware ESXi 6.5 vcenter Server 6.5

vcenter Server Appliance Configuration Update 1 Modified on 04 OCT 2017 VMware vsphere 6.5 VMware ESXi 6.5 vcenter Server 6.5 Update 1 Modified on 04 OCT 2017 VMware vsphere 6.5 VMware ESXi 6.5 vcenter Server 6.5 You can find the most up-to-date technical documentation on the VMware Web site at: https://docs.vmware.com/ The VMware

More information

Quick Start Guide. Kaseya 2

Quick Start Guide. Kaseya 2 LiveConnect Quick Start Guide Kaseya 2 February 13, 2010 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's

More information

Colligo Engage Outlook App 7.1. Connected Mode - User Guide

Colligo Engage Outlook App 7.1. Connected Mode - User Guide 7.1 Connected Mode - User Guide Contents Colligo Engage Outlook App 1 Benefits 1 Key Features 1 Platforms Supported 1 Installing and Activating Colligo Engage Outlook App 2 Checking for Updates 3 Updating

More information

Forescout. eyeextend for Carbon Black. Configuration Guide. Version 1.1

Forescout. eyeextend for Carbon Black. Configuration Guide. Version 1.1 Forescout Version 1.1 Contact Information Forescout Technologies, Inc. 190 West Tasman Drive San Jose, CA 95134 USA https://www.forescout.com/support/ Toll-Free (US): 1.866.377.8771 Tel (Intl): 1.408.213.3191

More information

Integrate Sophos Enterprise Console. EventTracker v8.x and above

Integrate Sophos Enterprise Console. EventTracker v8.x and above Integrate Sophos Enterprise Console EventTracker v8.x and above Publication Date: September 22, 2017 Abstract This guide provides instructions to configure Sophos Enterprise Console to send the events

More information